Is Looker HIPAA compliant? (2025 update)

2 min read

Is Looker HIPAA compliant? (2025 update)

Based on our research, Looker is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to safeguard protected health information (PHI).

Read More
red security lock

2 min read

Europcar GitLab breach exposes up to 200,000 customer records

What happened A hacker breached the GitLab repositories of Europcar Mobility Group, gaining access to application source code and customer...

Read More
Is Viva Engage HIPAA compliant? (2025 update)

2 min read

Is Viva Engage HIPAA compliant? (2025 update)

Based on our research, Viva Engage, previously Yammer, is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and...

Read More
Is Heroku HIPAA compliant? (2025 update)

1 min read

Is Heroku HIPAA compliant? (2025 update)

Based on our research, Heroku is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...

Read More
Image of an empty court room.

2 min read

New York woman sentenced for criminal HIPAA violation

A New York woman was sentenced to probation after mailing stolen health records as part of an extortion attempt.

Read More
Image of female and male symbols.

2 min read

Sensitive info spilled in sperm bank breach

California Cryobank has reported a data breach that may have exposed sensitive customer and financial information.

Read More
Image of child using a toy.

5 min read

HIPAA compliant messaging for early autism intervention programs

Early intervention helps children with autism spectrum disorder (ASD) develop communication skills, improve social interactions, and make progress in...

Read More
Image of a man with a hoody on a laptop.

5 min read

What is an enumeration attack?

An enumeration attack is a method used by hackers to confirm and verify records stored on a web server using brute-force techniques. These attacks...

Read More
Image of a hand hovering over a document with a gavel and hammer nearby.

2 min read

HISAA: A proposed overhaul to healthcare cybersecurity

A proposed bipartisan bill, HISAA, tries to enforce mandatory cybersecurity standards in healthcare, replacing HIPAA’s voluntary safeguards to better...

Read More
Image of lock.

5 min read

Top healthcare cybersecurity concerns for 2025

The healthcare industry is more digitally connected than ever, handling vast amounts of sensitive patient data while relying on complex systems to...

Read More
Image of classroom.

2 min read

PowerSchool data breach investigation reveals earlier hacks

PowerSchool’s long-awaited breach report reveals hackers infiltrated its systems months before the December 2024 attack.

Read More
Image of someone handing cash to someone else.

5 min read

What is diversion theft?

Diversion theft is a social engineering tactic that tricks individuals or businesses into redirecting valuable goods or information to an unintended...

Read More
Image of someone tapping a screen that reads

2 min read

What is explainable AI?

Explainable AI (XAI) refers to artificial intelligence systems designed to make their decision-making processes transparent and understandable to...

Read More