Lessons from the Snowflake breach: Strengthening SaaS security

3 min read

Lessons from the Snowflake breach: Strengthening SaaS security

The recent Snowflake data breach has sparked concern across the cybersecurity field, showing that data continues to be a top target for attackers. This incident brings attention to identity management in protecting software-as-a-service (SaaS)...

Read More
What are HIPAA's Other Arrangements?

3 min read

What are HIPAA's Other Arrangements?

Other Arrangements provide government entities with compliant pathways tailored to their specific needs, helping them fulfill their HIPAA obligations...

Read More
The difference between the HIPAA Privacy Rule and the Security Rule

3 min read

The difference between the HIPAA Privacy Rule and the Security Rule

HIPAA’s Privacy Rule focuses on protecting the privacy of all forms of protected health information (PHI), whether electronic, paper, or oral. It...

Read More
Legal marijuana and HIPAA

3 min read

Legal marijuana and HIPAA

When the use of marijuana is prescribed or discussed by a healthcare provider, the information is protected under HIPAA.

Read More
What are the HIPAA rules for video conferencing?

2 min read

What are the HIPAA rules for video conferencing?

The HIPAA rules for video conferencing in teletherapy require that any platform used has encryption, secure user authentication, and safe data...

Read More
Higher HIPAA penalties announced

3 min read

Higher HIPAA penalties announced

Violating HIPAA rules is now more expensive, as penalty fines will increase due to inflation adjustments recently announced by the Department of...

Read More
What are blind signatures?

1 min read

What are blind signatures?

A blind signature is a cryptographic method that hides the content of a message while it is being signed. It’s often used when the sender wants to...

Read More
CISA unveils new reporting portal for threat response 

2 min read

CISA unveils new reporting portal for threat response

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has rolled out a new portal to improve how cyber incidents and data breaches are...

Read More
CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

2 min read

CrowdStrike's congressional testimony: Addressing cybersecurity vulnerabilities

A faulty software update from cybersecurity firm CrowdStrike is under scrutiny as the company prepares to testify before Congress. Lawmakers try to...

Read More
Lessons learned from the CMS and WPS MOVEit cyberattack

3 min read

Lessons learned from the CMS and WPS MOVEit cyberattack

In May 2023, a vulnerability was discovered in the MOVEit software, a third-party file transfer application developed by Progress Software. This...

Read More
How a phishing scam took over my phone and how I recovered

3 min read

How a phishing scam took over my phone and how I recovered

On September 6, 2024, I received what seemed to be a routine text message about a delivery I was expecting.The message, supposedly from The Courier...

Read More
Disclosing a minor's PHI

3 min read

Disclosing a minor's PHI

Disclosing a minor’s PHI involves careful consideration of both HIPAA regulations and state-specific laws. While parents generally have the right to...

Read More
What is WAN optimization?

1 min read

What is WAN optimization?

WAN optimization improves data transfer processes by using various techniques including compression.

Read More