Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

A HIPAA Compliance Checklist

Maintaining security and compliance with HIPAA, the Health Insurance Portability and Accountability Act, is growing ever more challenging. The networks that house protected health information (PHI or ePHI) are becoming larger and more complex — especially as organizations move data to the cloud. At the same time, security professionals are faced with an evolving threat landscape of increasingly sophisticated threat actors and methods of attack.

Who Would You Hire in Your SOC?

I got curious about what kind of people are most desired in a Security Operations Center (SOC). I wondered how accepting InfoSec blue teamers would be to having a team member with a great attitude and system administration or network management skills, versus someone with deep InfoSec knowledge and skills. So I did a poll on Twitter to learn more.

Artificial Intelligence and Cybersecurity: Attacking and Defending

Cybersecurity is a manpower constrained market – therefore, the opportunities for artificial intelligence (AI) automation are vast. Frequently, AI is used to make certain defensive aspects of cyber security more wide-reaching and effective. Combating spam and detecting malware are prime examples.

Security Orchestration Use Case: Importance of Vulnerability Management Automation

Vulnerability management is a proactive approach that mitigates or prevents the exploitation of IT vulnerabilities that may exist in corporate critical systems or network. This approach involves a number of steps that include identification, classification, remediation, and mitigation of numerous vulnerabilities. According to CVE Details Report, 15703 vulnerabilities have been identified in 2018, compared to 14714 in 2017.

Cyber Security Budget Trends for Businesses in 2019

As 2019 approaches, it’s a great time to look ahead at your information security plan and see what is being prioritized in your budget. 2018 saw an increased interest in investing in external security audits and improved endpoint protection. Here are a few cyber security trends to adopt in 2019 that will keep your organization’s information as safe as possible.

Password Stealers Aren't Letting up Any Time Soon

Password security has always been a challenge. Brute force attacks are constantly getting more powerful, but they aren’t the only threat you have to worry about. A range of password stealing malware continues to grow in popularity. One example, Agent Tesla, has seen its detection rate grow 100% in just three months, according to data from LastLine. Despite this rapid growth, Agent Tesla is far from the most popular.

Weekly Cyber Security News 07/12/2018

A selection of this week’s more interesting vulnerability disclosures and cyber security news. I don’t often play games, and until this issue below appeared on my feed due to the self inflicted data breach I was blissfully unaware. Apart from the horrific appearing customer service, the breach is deeply unfortunate. What can we learn from it? Perhaps when under a lot of stress make sure you configure (was it a thread configuration issue or bug?) anything customer facing correctly.