Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

BIG things are Happening at Graylog!

Did you hear the news? Graylog is on a mission to help make your IT environment and data more efficient and secure by making it super easy to uncover the answers stored in your machine data. At Graylog, coming up with solutions to problems faced by IT and Security professionals is what drives us. Our teams are always working on ways to add meaningful functionality that increases productivity so you can focus your resources on the innovation and core competencies that you’re known for.

How to Use Cyber Assurance Programs to Manage Risk Based on Business Outcomes

If you’ve been following any of our recent webinars or in-person presentations, you’ve heard us talk a lot about shifting the mindset from a focus on compliance to a risk-first approach. We’ve discussed that the best way to do this is to align your risk management program to specific outcomes, where compliance becomes a subset of your risk management program. But what does that mean specifically? And what are some examples of how this can be done?

What is HIPAA compliance?

You are subject to HIPAA compliance if your business deals with Personal Health Information (PHI) of customers. It can be a daunting process to meet the standards of HIPAA regulations. Thankfully, Kintent is here to help! In our videos, we answer what HIPAA compliance is, who needs to comply, how to get compliant, and more. Would you like to become audit ready in 12 weeks, rather than 12 months? Learn more about Kintent.

Digicel Deploys Enea AdaptiveMobile Security to Protect Mobile Networks in 26 Caribbean and Central American Markets

Enea the world leader in mobile network security, today announced that Digicel Group has deployed Enea AdaptiveMobile Security's comprehensive signaling security solution to protect mobile networks and subscribers in 26 markets across the Caribbean and Central American region.
Featured Post

How Tech Innovation is Revolutionising Cybersecurity for Law Firms

It is often said that the human factor is the most important part of cybersecurity. In many ways this is true. Cybersecurity tech plays a vital role in everything from blocking dangerous traffic and spotting suspicious activity on an account, to offering the kind of 24/7 surveillance that simply isn't practical (or possible) for humans to carry out themselves. But ultimately, this is only a part of cybersecurity.

Performance improvements, snappier ports, and spring cleaning

The vulnerabilities page allows you to see all findings across your attack surface. This includes simple filters that let you specify what you want to focus on, including the level of severity, which domains you want to look at, and whether it was found in the past week or the past month.

What is the HIPAA Security Rule?

Title II of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) has two key provisions: the Privacy Rule and the HIPAA Security Rule. The Privacy Rule establishes standards for protecting certain health information, or PHI. The Privacy Rule requires those organizations that are governed by HIPAA (covered entities) to implement safeguards to protect the privacy of PHI, and gives individuals the right to access and share their health records.