Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Steps to Stay Ahead of Risks and Protect Data Privacy

Technology has advanced our world in countless ways. Every day we bank, shop, conduct business and exchange photos and messages with family and friends online. While digital devices and services offer great convenience, they also pose risks to our data and privacy as the separation between our offline and online lives converges. Data Privacy Week, spanning January 24-28, serves as an important reminder of the importance of protecting our privacy and safeguarding personal information.

Dark Overlord collaborator imprisoned for trading stolen identities

A Canadian man has been handed a three year prison sentence after being found guilty of buying and selling over 1700 stolen identities on a dark web marketplace. 29-year-old Slava Dmitriev, who went by the online handle of “GoldenAce”, bought and sold individuals’ personal private information, including social security numbers, on the AlphaBay dark web marketplace in 2016 and 2017.

How to Perform HIPAA Risk Assessment

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) requires healthcare entities to implement policies and procedures to safeguard the privacy and security of the protected health information (PHI) of patients. One core requirement is to perform risk assessments. This article explains what a risk assessment is according to HIPAA and offers guidance about the steps involved.

Will digitalization turn to be a catch-22 for cybersecurity in 2022?

As organizations became increasingly interconnected globally, every business started adapting to the digital model for all their transactions, fearing that otherwise they would be left behind in the race. Unfortunately, this has turned out to be a catch-22 as threats to cybersecurity are continually increasing. The rise in attacks was partly due to Log4j that helped to boost the cyberattack attempts to an all-time high in Q4 2021.

Threat Advisory: STRT-TA02 - Destructive Software

The Splunk Threat Research Team is monitoring open channel intelligence and government alerts indicating the possibility of malicious campaigns using destructive software in relation to ongoing geopolitical events. Based on historical data of named geopolitical actors, the use of destructive payloads has been observed in past campaigns.

Data Protection vs. Data Privacy

Advanced cybersecurity threats have heightened the harm of data breaches. At the same time, individuals have become increasingly aware of the information they share with companies, and expect organizations to protect that sensitive information. These two trends have led companies to invest in information security and data privacy practices.

Cybersecurity and Natural Disasters: How Mother Nature Affects Cyber Risk

It’s not easy to prepare for the natural disasters that might happen and devastate your business. Still, just as civil defense teams prepare for hurricanes, floods, heat waves and other adverse natural events, businesses need to develop a solid plan to confront the same.

Validation Requirements to Get an Individual Code Signing Certificate Issued

Like a loner wolf, are you among those software developers who work independently instead of being part of a company or an organization? If yes, you may have one major issue of not being recognized as any significant brand name for the software you develop. You may even have a headache of getting trusted by browsers and operating systems and bypassing ugly warning messages like an unknown publisher.

How to Setup Your EV Code Signing Certificate [An Easy Guide]

The collection process of an EV Code Signing certificate is quite different compared to the OV (Organization Validated) Code Signing certificate. But it also offers additional security practices that aren’t provided by a standard code signing certificate. Nonetheless, here in this piece of article, we’ll discuss how to setup your EV Code Signing certificate so you can move further with digitally signing your applications and software.

CMMC Town Hall With Tom Tollerton, Dixon Hughes Goodman LLP | 1/26/22 | NeoSystems

NeoSystems CMMC Town Hall Series: Join NeoSystems’ Chief Information Security Officer, Ed Bassett, for our weekly CMMC Town Hall designed for the Defense Industrial Base and GovCon community. Each session features special guests and offers an opportunity for attendees to ask questions regarding CMMC and cybersecurity. Topics covered include CMMC compliance requirements, how to prepare for CMMC certification, and the latest updates from the CMMC AB.