Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Weekly Cybersecurity Recap September 8

Each week, new data breaches plague the public. This week, significant healthcare and retail breaches led to substantial data losses for customers and patients throughout the United States. With companies like Forever 21, Callaway, and United Healthcare involved, there were serious data losses. Cognizant and Indiana Medicaid were also breached this week. Learn all the details below.

UnitedHealthcare Patients Exposed in An Unexpected Data Breach

UnitedHealthcare is a large insurance company that serves more than 8 million Americans throughout the United States. The company gathers health, personal, and financial information and utilizes all those different data points to provide reliable insurance services. It's upsetting to learn that UnitedHealthcare was recently attacked and significant data may have been lost.

Securing Endpoints By Applying 'Passive Income' Concepts

Investing in cybersecurity is a lot like working hard to save for retirement. Your budget’s already tight, but you must secure the future. You’re faced with endless headlines and market updates that make you nervous about making the wrong choices – or not making moves quickly enough amid fast-changing conditions.

Enabling Workload-Level Security for AKS with Azure Firewall and Calico Egress Gateway

Teams implementing the Azure Well-Architected Framework, and using the Hub and Spoke network topology often rely on the Azure Firewall to inspect traffic coming from Azure Kubernetes Service (AKS) clusters. However, they face challenges in precisely identifying the origin of that traffic as it traverses the Azure Firewall. By default, traffic leaving a Kubernetes cluster is not assigned a meaningful network identity that can be used to associate it with the application it came from.

A Simple, Flexible Digital Foundation for Architectural Practice

The practice of architecture has been “going digital” for more than 30 years. Starting with the proliferation of CAD software in the 1990s, this technological shift accelerated with the mainstream adoption of BIM tools and workflows in the 2000s. Digital practice has broadened since that time to include visualization, simulation, analysis, automation, and even AI-driven generative design.

Data Governance in 2023:Definition & Best Practices

The world is becoming more reliant on data through data analytics and AI, where a lack of data quality can cost 74% more time spent on non-value added tasks by employees. This makes proper data governance more crucial than ever. As organizations become data-driven and interact with more data than ever, understanding the ins and outs of data governance is essential for ensuring data quality, security, and regulatory compliance.

Deep learning in security: text-based phishing email detection with BERT model

Phishing emails are fraudulent or malicious emails that are designed to deceive recipients and trick them into revealing sensitive information, such as login credentials, financial details, or personal data. Phishing email contents usually employ various social engineering techniques that are likely to manipulate recipients, leading to significant damage to personal or corporate information security.

eCriminals Share Ways to Impersonate School Staff to Steal Paychecks

CrowdStrike Counter Adversary Operations monitors for and attempts to disrupt eCrime threat actors across a broad spectrum of malicious activity, ranging from sophisticated ransomware campaigns to simpler but often highly effective forms of fraud.