people icons connected to lightbulb

2 min read

Building patient trust through equity-centered designed digital tools

One of the biggest challenges in healthcare today involves mistrust among diverse populations. These challenges are often closely linked to a history of inequity and systemic barriers that have left communities underserved and disconnected from the...

Read More
Image of warehouse for blog about What we know about the Amazon data leak so far

2 min read

What we know about the Amazon data leak so far

Amazon has confirmed that attackers exposed data from some of its employees, with the perpetrators stating they intend to push data owners to...

Read More
Image of mouse and laptop for blog about What is rate limiting?

3 min read

What is rate limiting?

Rate limiting is a versatile technique employed to regulate the frequency of user or application interactions with a web property. It can protect...

Read More
Image of lock for blog about What is shadow data?

3 min read

What is shadow data?

Shadow data refers to data created, stored, or used outside officially sanctioned IT systems or governance frameworks. It typically includes files,...

Read More
Image of lock on keyboard for blog about Hackers face federal charges in billion-record data breach

2 min read

Hackers face federal charges in billion-record data breach

The US government has officially charged two hackers accused of stealing 50 billion customer records from AT&T and other major companies.

Read More
Image of phone and text boxes for blog about HIPAA compliant automated messaging for preventive care reminders

3 min read

HIPAA compliant automated messaging for preventive care reminders

Automated messaging can be used for HIPAA compliant preventive care reminders when the communication is directly related to the patient’s treatment,...

Read More
nursing home room with bed and wheelchair

2 min read

Are senior care facilities covered entities under HIPAA?

Not every senior care facility is a covered entity, but those that provide medical care and handle protected health information (PHI) must adhere to...

Read More
blue digital lock

2 min read

AAP hit by ransomware: Attackers demand double payment

A ransomware attack by Embargo has allegedly targeted American Associated Pharmacies (AAP). The attackers claim that AAP paid $1.3 million to regain...

Read More
Robert F. Kennedy Credit: Wikimedia Commons Gage Skidmore

1 min read

Trump picks Robert F. Kennedy Jr. to lead health department

Donald Trump announced his selection of Robert F. Kennedy as his nominee as the Secretary of the HHS.

Read More
Image of graph for blog about What is UBA software?

2 min read

What is UBA software?

Through continuous monitoring of user behavior, user behavior software (UBA) provides a layer of protection that complements existing security...

Read More
Image of puzzle for blog about What is business impact analysis?

2 min read

What is business impact analysis?

A business impact analysis is the first step in an effective cybersecurity policy. During the process, organizations will analyze their security...

Read More
Image of lock for blog about Cyber threat trends for OT and ICS networks

1 min read

Cyber threat trends for OT and ICS networks

Cyberattacks are shifting focus to industrial systems, with new threats targeting OT and ICS networks.

Read More
Face@Gene logo

2 min read

How facial recognition technology is changing healthcare privacy

Facial recognition technology (FRT) is transforming healthcare with applications that promise earlier diagnoses and more personalized treatments. New...

Read More