Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The REAL Impact of Hospital Cyberattacks, It's More Than Just 'Rescheduling #shorts #cybersecurity

When hospitals say "procedures were rescheduled" after a cyberattack, they're missing the human cost. For many patients, a medical appointment isn't just a calendar entry – it's arranged time off work, transportation plans, aftercare support, and lost wages. These disruptions hurt vulnerable communities the most and damage the essential trust between healthcare providers and their patients.

Ivanti Discloses Active Exploitation of Zero-Day Vulnerability

Ivanti has disclosed vulnerabilities affecting Ivanti Connect Secure (ICS), Ivanti Policy Secure (IPS) and Ivanti Neurons for Zero Trust Access (ZTA) Gateways. According to Ivanti, CVE-2025-0282 has been exploited on a limited number of ICS appliances. There are no confirmed reports of exploitation for Ivanti Policy Secure or ZTA Gateways. There is no indication that CVE-2025-0283 is actively exploited or chained.

Mastering OpenShift Virtualization Backup - Recover VMs in 3 Minutes

In my previous blog post, (OpenShift Virtualization Backup and Restore with Trilio in AWS ROSA Baremetal ) I discussed how to protect VMs running in OpenShift Virtualization, specifically in AWS ROSA Baremetal environments. In this post, I want to focus on how you can recover a VM in less than 3 minutes. When it comes to recovery in Kubernetes environments, many of us feel relatively at ease, especially if the Persistent Volumes (PVs) are not particularly large.

Why Vulnerability Scanning Alone Isn't Enough: The Case for Penetration Testing

Organizations today face a rapidly evolving threat landscape, and as they plan their cybersecurity strategy and budgets, many may struggle with a key question: If I’m conducting regular vulnerability scans, and patching the vulnerabilities I identify, do I really need penetration tests as well? The answer is yes. While vulnerability scanning plays a vital role in identifying risks and vulnerabilities, relying solely on it for security creates blind spots.

The Top 10 Reasons People Fail a CMMC Audit

The Cybersecurity Maturity Model Certification, version 2.0, is finally in effect, which means thousands of businesses that have roles in the Department of Defense supply line need to do the work to comply and pass their audits to receive certification. It’s inevitable that many of these businesses will fail their initial audits. The standards are high, the margin of error is narrow, and the timeline is tight.

Friday Flows Episode 47: Using Tines to get into the festive spirit

In a festive special of Friday Flows, Colleen Gallagher joins host Cameron Higgs to walk through a workflow that uses AI in Tines, Pages, and branching logic to dynamically select the right playlist to match your mood for the holiday season. Colleen delivers all of the Tines bootcamps to our community of users.

2025: The Year of Evolution in Identity Security by David Morimanno, Director of Identity and Access Management Technologies

The year 2025 will not be a revolutionary one, it will be evolutionary, with developments coming into effect that were necessitated by events and happenings in 2024, and solutions to address these events reaching maturity levels that allow an appropriate, comprehensive response. With threats like ransomware certain to continue, identity resilience is going to become more important in the year ahead and, as such, identity will become the critical component of security.

Year in Review Report Overview

Seemplicity’s 2024 Year in Review report offers key insights into how organizations are navigating the challenges of vulnerability and exposure management. By analyzing data from over a billion customer findings across a wide range of industries, the report highlights the urgency of prioritizing vulnerabilities, streamlining workflows, and improving collaboration across teams.