email icons on red background

1 min read

Study: 80% of organizations faced email breaches in the last year

A recent study reveals that 80% of critical infrastructure organizations fell victim to email-related security breaches last year.

Read More
Image of someone on their phone for blog about Social media HIPAA violation series: Grady Hospital - Facebook posts

3 min read

Social media HIPAA violations: Grady Hospital and Facebook posts

A paramedic’s posts in a controversial Facebook group uncovered serious breaches of patient privacy and ethical conduct, leading to disciplinary...

Read More
Image of people on their phones for blogs about Social media HIPAA violations

4 min read

Social media HIPAA violations

In the first half of 2018 alone, more than 56% of the 4.5 billion compromised data records were tied to social media incidents. These breaches can...

Read More
Image of shield for blog about CISA focusing on critical infrastructure resilience in November

2 min read

CISA focusing on critical infrastructure resilience in November

November is Critical Infrastructure Security and Resilience Month, and CISA is showing ways to strengthen systems across the U.S.

Read More
Image of doctor taking a blood pressure test for blog about Social media HIPAA violation series: Photo post

2 min read

Social media HIPAA violation series: Photo post

A photo shared from a Tennessee operating room in October 2020 raised concerns about privacy and professionalism, prompting Ballad Health to take...

Read More
Image of phones for blog about Social media HIPAA violations: Lincoln Hospital - Pandemic perspectives

2 min read

Social media HIPAA violations: Nurse shares pandemic perspective

A nurse’s video about working conditions during the COVID-19 pandemic sparked a HIPAA investigation, raising concerns about patient privacy and...

Read More
Image of warehouse for blog about What we know about the Amazon data leak so far

2 min read

What we know about the Amazon data leak so far

Amazon has confirmed that attackers exposed data from some of its employees, with the perpetrators stating they intend to push data owners to...

Read More
Image of mouse and laptop for blog about What is rate limiting?

3 min read

What is rate limiting?

Rate limiting is a versatile technique employed to regulate the frequency of user or application interactions with a web property. It can protect...

Read More
Image of lock on keyboard for blog about Hackers face federal charges in billion-record data breach

2 min read

Hackers face federal charges in billion-record data breach

The US government has officially charged two hackers accused of stealing 50 billion customer records from AT&T and other major companies.

Read More
Image of lock for blog about Cyber threat trends for OT and ICS networks

1 min read

Cyber threat trends for OT and ICS networks

Cyberattacks are shifting focus to industrial systems, with new threats targeting OT and ICS networks.

Read More
Image of cloud overlooking a city for blog about AI technology and HIPAA

3 min read

AI technology and HIPAA

As healthcare organizations and their business partners strive to use the power of AI to enhance patient care, streamline operations, and unlock...

Read More
Image of lock for blog about New report highlights the financial impact of cyberattacks

3 min read

New report highlights the financial impact of cyberattacks

A recent industry report by Claroty has shown the economic toll of cyberattacks, providing insights for businesses striving to fortify their defenses...

Read More
Department of health and human services logo

2 min read

OCR unveils updated security risk assessment tool

The Office for Civil Rights (OCR) under the Department of Health and Human Services (HHS) has released an enhanced Security Risk Assessment (SRA)...

Read More