
Akilnath BodipudiCommon Spirit Health · Cybersecurity Engineer
Akilnath Bodipudi
Master of Science
About
20
Publications
720
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2
Citations
Introduction
I am a cybersecurity professional with experience in healthcare, Entertainment, and IT services industries.
Publications
Publications (20)
Zero Trust Architecture (ZTA) has emerged as a fundamental approach to cybersecurity, challenging traditional perimeter-based security models by assuming that threats exist both inside and outside the network. Central to the effectiveness of ZTA is policy enforcement, which dictates how access decisions are made based
on continuous verification and...
Based on this project the aim is to optimize the network traffic before the attack surface exposes to the bad guy. Two things must be done to accomplish this goal: first, it must be made clear how important it is to promptly identify and monitor the attack from Next-Gen Firewall solutions setting, and second, sophisticated firewall techniques must...
The merger and acquisition (M&A) of hospitals present unique cybersecurity challenges that necessitate thorough and systematic audits. This paper explores the critical role of post-merger cybersecurity audits in identifying vulnerabilities, ensuring compliance, and integrating security practices within newly merged healthcare entities. By delineati...
Vendor risk assessment is a critical component of comprehensive risk management strategies, particularly in an era characterized by complex supply chains and increasing reliance on third-party vendors. This paper aims to provide a comparative analysis of prominent vendor risk assessment frameworks, including NIST SP 800-1C1, ISO 27001, and the Shar...
The Internet Key Exchange (IKE) protocol is a critical component in establishing secure communication channels over the internet. While IKEv1 has been widely adopted, its successor, IKEv2, offers significant enhancements. This paper explores the motivations driving organizations to migrate from IKEv1 to IKEv2. Key reasons include improved security...
In the rapidly evolving landscape of information security, cryptographic protocols and algorithms play a crucial role in ensuring the confidentiality, integrity, and authenticity of data. This paper delves into three primary aspects of cryptographic security: the development of new cryptographic protocols, the analysis of existing cryptographic alg...
This review delves into the critical role of network segmentation in securing biomedical devices within healthcare organizations. It highlights the importance of isolating these devices to protect against cyber threats and ensure compliance with industry regulations. The review examines the unique challenges posed by biomedical devices, such as the...
The advent of 5G technology promises significant advancements in healthcare, particularly through the enhanced connectivity and data transmission capabilities for biomedical devices. However, this increased connectivity also introduces new security challenges that must be addressed to ensure the integrity, confidentiality, and availability of patie...
Email communication is vital in healthcare for exchanging sensitive patient information and coordinating care. However, unsecured email poses significant risks to patient privacy and data integrity. This paper examines the importance of email security in healthcare, focusing on Data Loss Prevention (DLP) and email encryption. We provide a comprehen...
Introduction Constant progress in technology has changed the world and cybersecurity is no exception to it. The focus on technology-based solutions in the traditional approaches often overlooks or gives very little importance to human behavior and ethical aspects. This paper proposes a human-centered security strategy against cyber attacks, taking...
The increasing complexity of modern network environments necessitates advanced methods for managing Virtual Private Network (VPN) performance. One critical issue is the occurrence of zero-hit counts in VPN tunnels, where traffic fails to pass through specific tunnels, impacting network efficiency and security. This paper explores the automation of...
In the era of DevOps, the integration of Continuous Integration and Continuous Deployment (CI/CD) pipelines has revolutionized the software development lifecycle, ensuring rapid and reliable delivery of applications. However, this accelerated development pace introduces significant security challenges, particularly in maintaining the security postu...
In healthcare environments, network tunneling is crucial for secure data transmission, ensuring that sensitive patient information and critical healthcare operations are protected from unauthorized access and cyber threats. However, the implementation of network tunnels often comes with a trade-off between security and performance. This paper exami...
In today's increasingly interconnected digital landscape, endpoint security has emerged as a critical component in safeguarding sensitive data and devices across various sectors. This paper explores the intricacies of endpoint security within the IT domain, highlighting the unique challenges and effective solutions for protecting devices and data....
In modern DevOps workflows, managing secrets and credentials such as API keys, passwords, and certificates is crucial to maintaining security and operational efficiency. As organizations increasingly adopt DevOps practices, the need to integrate security measures without hindering agility has become paramount. This paper explores the challenges and...