Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to secure PHI with an identity governance solution

Cyberattacks pose a growing threat across all industries, but healthcare is especially vulnerable. In 2023, hacking incidents in the healthcare sector accounted for 79.7% of data breaches. While patients, providers, and policymakers all have a stake in protecting health information, a critical weak point lies with the technology companies that offer electronic health record (EHR) systems. These systems hold a treasure trove of PHI, making them prime targets for cybercriminals.

Securing Samba Ports: Essential Practices for Safeguarding Your Network

In the vast and interconnected world of information technology, the security of network services and protocols is paramount for organizations of all sizes. Among these, Samba—a free software re-implementation of the SMB/CIFS networking protocol—plays a crucial role in facilitating file and print services across various operating systems, including Unix, Linux, IBM System 390, and Windows.

The cyber threat landscape in Japan - risks, threats and mitigation guidance

In our recent research “Better Safe Than Sorry”, we reported how the number of exposed OT/ICS devices in Japan grew by 372% over the past six years. During this time, several notable cyber-attacks targeted businesses and government entities in Japan. The substantial increase in exposed OT/ICS combined with the recent cyber-attacks in Japan has prompted us to give a deeper look at the current threat landscape in the country.

Crafting An Effective Insider Threat Incident Response Plan

Organizations face many threats today, but not all potential threats are from malicious activities outside the organization. Insider threats are just as significant, if not more significant, of a security risk to companies today. Since 2018, there has been a 40% increase in data breaches caused by company insiders, so they now represent most of them.

Proactive Measures to Prevent Data Theft

As the world becomes more and more digitally intertwined, the significance of data security cannot be overstated. Data theft, a critical threat to organizations worldwide, poses severe challenges, jeopardizing both reputational integrity and financial health. This blog post aims to dissect the concept of data theft, understand its impacts on organizations, and outline proactive measures to safeguard against such threats.

What Is the RSA Algorithm and How Does It Work?

In today’s digital landscape, cryptography plays a vital role in keeping information secure. Encryption is one of the primary techniques used in cryptography to ensure that data transmission online is secure and that sensitive information stays protected from unauthorized access. Through encryption, organizations and individuals can mitigate the risk of data breaches and ensure that their confidential information remains that way.

The Cybersecurity of the S&P 500: An in-depth analysis from SecurityScorecard

In fall 2023, the U.S. Securities and Exchange Commission (SEC) adopted landmark cybersecurity regulations, requiring public companies to disclose “material” cybersecurity incidents within four days. Prior to this, there were very few breach reporting requirements, leaving business leaders, government officials, policymakers, and investors without key information on cybersecurity incidents.

UK Creates New Laws to Safeguard Consumers Against Cyber Threats Posed by Smart Devices

As 99% of UK adults now own at least one smart device, and the average UK household enjoys the benefits of nine connected devices, the timing of new laws designed to protect consumers from hacking and cyber-attacks while using internet-connected smart devices couldn't be more timely.