Image of shield for blog about CISA focusing on critical infrastructure resilience in November

2 min read

CISA focusing on critical infrastructure resilience in November

November is Critical Infrastructure Security and Resilience Month, and CISA is showing ways to strengthen systems across the U.S.

Read More
Image of doctor taking a blood pressure test for blog about Social media HIPAA violation series: Photo post

2 min read

Social media HIPAA violation series: Photo post

A photo shared from a Tennessee operating room in October 2020 raised concerns about privacy and professionalism, prompting Ballad Health to take...

Read More
Image of phones for blog about Social media HIPAA violations: Lincoln Hospital - Pandemic perspectives

2 min read

Social media HIPAA violations: Nurse shares pandemic perspective

A nurse’s video about working conditions during the COVID-19 pandemic sparked a HIPAA investigation, raising concerns about patient privacy and...

Read More
Image of warehouse for blog about What we know about the Amazon data leak so far

2 min read

What we know about the Amazon data leak so far

Amazon has confirmed that attackers exposed data from some of its employees, with the perpetrators stating they intend to push data owners to...

Read More
Image of mouse and laptop for blog about What is rate limiting?

3 min read

What is rate limiting?

Rate limiting is a versatile technique employed to regulate the frequency of user or application interactions with a web property. It can protect...

Read More
Image of lock on keyboard for blog about Hackers face federal charges in billion-record data breach

2 min read

Hackers face federal charges in billion-record data breach

The US government has officially charged two hackers accused of stealing 50 billion customer records from AT&T and other major companies.

Read More
Image of lock for blog about Cyber threat trends for OT and ICS networks

1 min read

Cyber threat trends for OT and ICS networks

Cyberattacks are shifting focus to industrial systems, with new threats targeting OT and ICS networks.

Read More
Image of cloud overlooking a city for blog about AI technology and HIPAA

3 min read

AI technology and HIPAA

As healthcare organizations and their business partners strive to use the power of AI to enhance patient care, streamline operations, and unlock...

Read More
Image of lock for blog about New report highlights the financial impact of cyberattacks

3 min read

New report highlights the financial impact of cyberattacks

A recent industry report by Claroty has shown the economic toll of cyberattacks, providing insights for businesses striving to fortify their defenses...

Read More
Department of health and human services logo

2 min read

OCR unveils updated security risk assessment tool

The Office for Civil Rights (OCR) under the Department of Health and Human Services (HHS) has released an enhanced Security Risk Assessment (SRA)...

Read More
Image of hooded figure for blog about Healthcare ransomware attacks continue to increase in number and severity

3 min read

Report shows healthcare ransomware attacks are increasing

The healthcare sector has seen a rise in ransomware attacks, even as many other industries have experienced a decline. According to the State of...

Read More
Image of a Nokia phone for blog about Nokia investigates breach after hacker claims to steal source code

2 min read

Nokia investigates breach after hacker claims to steal source code

Nokia, a leader in telecommunications, is investigating a cybersecurity breach after a hacker, known as IntelBroker, claimed to have accessed and is...

Read More
digital concept of gray security shield

3 min read

How do we protect patient data against insider threats?

Insider threats put the healthcare industry's security and confidentiality of patient data at risk. Healthcare organizations often overlook potential...

Read More