2 min read
Top cybersecurity focus areas revealed at HHS and NIST conference
The HHS/NIST conference, titled Safeguarding Health Information: Building Assurance through HIPAA Security 2024, took place on October 24, 2024, in...
2 min read
The HHS/NIST conference, titled Safeguarding Health Information: Building Assurance through HIPAA Security 2024, took place on October 24, 2024, in...
3 min read
With 328.77 million terabytes of data created daily, it's no surprise that cyber threats are on the rise, as criminals look to exploit this valuable...
2 min read
Quishing is a cyber threat that exploits QR codes and phishing in deceptive emails, posing risks like data breaches and malware infections. The HC3...
2 min read
Cybersecurity performance goals (CPGs) are a set of cybersecurity best practices and minimum-security standards developed by the Cybersecurity and...
2 min read
Machine-in-the-middle attacks, often called "man-in-the-middle" (MitM) attacks, occur when an attacker intercepts communication between two parties...
4 min read
Homograph domain attacks, closely linked to typosquatting techniques, take advantage of the fact that many Unicode characters from different...
2 min read
Network segmentation is a security practice that involves dividing a computer network into smaller, manageable sub-networks (segments). This approach...
2 min read
Hijacking communications between patients and providers often allows cybercriminals to extract information and solicit payments and other actions...
2 min read
Access controls are the security protocols and measures that determine who can access specific resources, systems, or information within an...
4 min read
OAuth is a consent protocol that relies heavily on user consent, on users making an informed decision to approve or deny access to their data....
2 min read
During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, Rahul Gaitonde, HHS Cyber Security...
2 min read
On October 23, 2024, the HHS Cyber Security Operations Cyber Threat Intelligence Branch released a list of notable cyber threat actors, including...
2 min read
The rapid development of Artificial Intelligence (AI) opens the way for more sophisticated and focused cyberattacks. On October 23, 2024, at the...