Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Prevent Fraud in Healthcare by Knowing Your Patient?

Healthcare fraud, waste, and abuse cost taxpayers billions of dollars. According to a report published in BusinessWire, the global healthcare fraud analytic market may reach US$ 5.69 billion by 2027. Detection of fraud leads to hefty fines, criminal proceedings, and incarceration for the concerned individuals in organizations. 2021 saw a peaking of medical fraud and abuse, according to the latest report of the HIPAA journal.

How Penetration Testing Can Better Prepare You for a SOC 2 Audit

The goal of a SOC 2 audit is to evaluate and verify how a service provider, whether an IT provider, Software-as-a-Service (SaaS) platform, or other outsourced solution, handles sensitive customer data. Companies are pursuing SOC 2 certification because it is an industry-recognized way to show customers that their security program is worthy of their trust. When thinking about how to prepare for a SOC 2 audit, cyber risk assessment and penetration testing should be on your list.

A Complete Guide to Major Incident Management

Imagine a nightmare where you are in a dark tunnel and every minute without reaching the light costs a fortune. You try everything to find the exit, but there is nothing you can do. The incarnation of these nightmares is called “Major Incidents” in the cyber security field. These nightmares are likely to become a reality for managers of many organizations today, where companies manage almost all their business processes with digital solutions.

Reducing the Impact of Third-Party Breaches (8 Strategies)

Third-party breaches have become a common phenomenon in the modern cyber threat landscape. In 2021, the Ponemon Insitute estimated that 51% of organizations were impacted by third-party breaches. The 2022 report found that data breach damage costs associated with third-party vulnerabilities rose from US$ 4.33 million in 2021 to US$ 4.55 million in 2022.

How to Write the Executive Summary of a Cybersecurity Report

Let’s face it, information technology experts are usually not enthusiastic writers. So when it comes to creating an executive report, cybersecurity staff aren’t exactly pushing each other over to get this exciting writing task complete. Instead, it keeps getting delayed, day by day, until the night before its submission. Many get stuck on the executive summary section, obsessing over its perfection.

Interview with Co-founder and Chief Scientist, Kurt Rohloff

For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Kurt Rohloff, Co-founder and Chief Scientist, of Duality. Prof. Rohloff is the founding architect of the PALISADE open-source homomorphic encryption library and co-founder of the HomomorphicEncryption.org industry consortium.

One Click Hijack: TikTok Android App Users at Risk?

Amidst the havoc that has been data breaches, another one bites the dust! Microsoft on Wednesday disclosed that they had found a high-severity flaw in the Android version of the TikTok app that gives the hackers a free way to hijack a user's accounts with One SINGLE click. The issue had apparently been reported to Tiktok back in February and was quickly fixed before it could be exploited.

The Quiet Victories and False Promises of Machine Learning in Security

Contrary to what you might have read on the Internet, machine learning (ML) is not magic pixie dust. It’s a broad collection of statistical techniques that allows us to train a computer to estimate an answer to a question even when we haven’t explicitly coded the correct answer into the program.

How Colleges & Universities Can Prevent Data Leaks

Data leaks occur when organizations fail to implement proper cybersecurity measures, causing sensitive data and other personally identifiable information (PII) to be exposed to the public. In most cases, data leaks occur due to internal human errors, an oversight by the IT committee, or a lack of strong security practices.