Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

HHS HIPAA Guidelines Target Tracking on Public Web Pages

The U.S. Department of Health and Human Services (HHS) has shared new guidance on HIPAA. This guidance focuses on using tracking technologies on public healthcare pages. This updated directive directly impacts healthcare organizations utilizing tools like Meta Pixel, Google Analytics, or session replay scripts. While these are effective for understanding user engagement, they may inadvertently collect PHI—protected health information—if configured improperly.

PowerPoint Plugin for Charts vs Excel Embeds for Live Presentations

If you present data often, you know how long it can take to make slides look clean and easy to understand. With the right tools, you can save time while achieving professional results. Many presenters rely on Excel embeds, but more are now turning to a PowerPoint plugin for charts to simplify the process. In this article, we'll compare both options and help you figure out which one fits your presentation style and goals best.

What is FIPS 140-3?

Encryption has become a vital data protection tool used by global governments, defense and enterprises. However, not all solutions use the same cipher techniques. Several encryption algorithms can be used to secure data with varying levels of security. To establish acceptable standards for encryption technologies utilized by the U.S. Government, the National Institute of Standards and Technology (NIST) published the Federal Information Processing Standards (FIPS) FIPS-140.

What are CIS Benchmarks and how to use them?

A list of 18 procedures (reduced from 20), or “controls,” recommended by the Center for Internet Security (CIS), must be followed to build an IT infrastructure resistant to cyberattacks. The CIS 4th Control advises to establish and maintain a secure configuration process for enterprise assets (end-user devices, including portable and mobile; non-computing/IoT devices; and servers) and software (operating systems and applications) (4.1).

Cloud XDR for Incident Response: Reducing MTTR with Automated Remediation

Security teams now handle up to two million alerts daily, and the time it takes to resolve threats—MTTR—can directly affect business resilience. Cloud-based Extended Detection and Response (XDR) systems address these challenges by streamlining the entire process—from detection to automated remediation. By harnessing cloud-native architectures and response automation, organizations can detect threats faster and cut resolution times significantly.

The Top Phishing Lures Targeting Manufacturers Revealed by Trustwave SpiderLabs

Threat actors who rely on email phishing scams as their primary method of gaining initial entry use a wide variety of social engineering lures to trick their victims. Trustwave SpiderLabs recently released the report Manufacturing Sector Deep Dive: Methods of Targeting and Breaching, which specifically calls out many noteworthy campaigns and methodologies used by the top-tier threat groups.

10 Tips for Strengthening Enterprise Security this World Password Day

These days, securing sensitive data begins with a single word (or, ideally, a few): passwords. In the face of rising cyber threats, the importance of creating, using, and managing secure passwords cannot be overstated. That’s why, each year, the world sets aside the first Thursday in May to recognize World Password Day—an event dedicated to promoting the criticality of password hygiene in both our personal and professional lives.

Mastering Risk-Based Vulnerability Management: A Strategic Method to Cybersecurity

Organizations operating in today's rapidly changing digital age face mounting threats to the level of security. Deployment of conventional methods to vulnerability management by periodic scans and blanket scoring will no longer be adequate. Instead, strategy should shift direction toward risk-based vulnerability management towards protection of digital assets.

Zero-Day in Your ZIP: Inside CVE-2025-33028: How a WinZip Flaw Exposes Users to Silent Malware Execution

In the vast landscape of cybersecurity, it’s often not the zero-click iPhone exploits or flashy ransomware variants that expose the most users — sometimes it’s the tools we’ve trusted for decades. One such example is CVE-2025-33028, a vulnerability in WinZip, a program that’s been a staple in personal and corporate environments for over 30 years.