Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Protecting Healthcare Payments from Cyber Attacks: Tools and Strategies

In April 2022, a medical billing company based in New York became the victim of a serious ransomware attack. Bad actors stole personal and financial data of patients from 26 healthcare institutions who were the company’s clients. The billing company had to notify almost 1 million individuals that their data had been stolen. Over the last few years, organizations and fintechs that process payments for healthcare providers have become a hot target for cyber attacks.

The Role of AI/ML and Automation in CyberSecurity

Let’s talk about having automation tools and AI/ML for cyber security. To combat the bad guys trying to break into your environment all the time, you need tools that can: In fact, you must automate 99% of your alerts because if humans have to do it, they will feel overloaded and make mistakes. But you can’t replace human judgment. It’s like flying a plane. Most of the time, it flies on autopilot. But at crucial moments like take off, landing, or when there’s a thunderstorm, the pilot disengages the autopilot and actively takes the wheel.

Coffee Talk with SURGe: Ukraine War, GRU Hactivist Coordination, Network Monitoring, Optus Breach

Grab a cup of coffee and join Audra Streetman and special guests David Bianco and Haylee Mills for another episode of Coffee Talk with SURGe. The trio will discuss the latest cybersecurity news, including: Haylee and David competed in a 60 second charity challenge to explain the concept of domain shadowing. The team also discussed the Uber hack as it relates to general security practices at companies.

How to Engage Developers to Build a Successful Application Security Program

If you’re helping shape application security in an organization, whether as an external security consultant or vendor, or as part of an internal security team, it is critical to work effectively with developers. While a lot of individuals have an interest and stake in security, and many have a significant role to play, developers who write code and fix flaws determine whether application security initiatives succeed or fail.

How Can Cybersecurity Professionals Account for Vulnerabilities in Fleet Data?

Fleet operations today revolve around data. Telematics systems, connected cars, and similar IoT systems provide fleet managers with a wealth of information, but this connectivity also raises security concerns. As data breach costs reach their highest point in decades, accounting for vulnerabilities in organizations’ data becomes increasingly crucial. Data-rich and notoriously difficult-to-secure fleets are no exception.

Beat the challenges of supply chain vulnerability

Supply chain disruptions have had a devastating impact on the global economy. Suppliers and consumers feel the sting from rampant inflation to product shortages and factory closures. One leading cause of supply chain disruption — a dramatic increase in cyberattacks — is a significant concern for CXOs and IT executives.