Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Children's Hospital Cyberattack Compromises Sensitive Medical Data

A recent cyberattack on Lurie Children's Hospital in Chicago has resulted in a significant data breach, exposing the personal information of 791,000 patients. Despite the hospital's refusal to pay a ransom, a vast amount of sensitive medical data is now at risk. Details of the Attack The cybercriminals infiltrated the hospital's systems, causing severe disruptions to its patient portal, communications, and access to medical records.

Cato Networks recognized as a Leader in the 2024 Gartner Magic Quadrant for Single-Vendor SASE Report

SASE is all about strategically solving business problems. The systematic removal of technology barriers standing in the way of business outcomes. It is a brand new “how” (platform) for a well-known “what” (features). When we started Cato in 2015, we were immersed in skepticism. Can you actually build a cloud network that will replace MPLS circuits with decades of proven reliability?

Deep Dive into Blockchain Security: Vulnerabilities and Protective Measures

Blockchain technology, renowned for its decentralized and immutable nature, promises enhanced security for various applications. However, like any technology, it is not without vulnerabilities. This in-depth examination explores the security aspects of blockchain, identifies common vulnerabilities, and outlines the measures needed to secure blockchain applications effectively.

Sysdig Customer Care Chronicles - Security Is A Team Sport

For the Sysdig Customer Success team, our mission is simple: ensuring that our customers get the most value from our product. Usually that means helping them use the product, answering questions, and requesting feature enhancements. In our line of work, sometimes you have to throw out the usual playbook to make things happen. This particular story started when we noticed a change in a customer’s agent usage.

7 Phishing Awareness Training Methods You Should Know

Modern cybercriminals aren’t just after your average employee. They’re targeting DevOps engineers – the gatekeepers of critical infrastructure and valuable data. 90% of data breaches start with phishing. Traditional awareness training often needs more technical depth. These programs tend to focus on generic red flags (e.g., suspicious links and requests for sensitive information) that are easily recognized by most.

The Significance of the Number 42 in the New ISO AI Standard

The number 42 has gained legendary status in popular culture, largely due to Douglas Adams’ science fiction series, The Hitchhiker’s Guide to the Galaxy. In this series, a group of hyper-intelligent beings build a supercomputer named Deep Thought to calculate the “Answer to the Ultimate Question of Life, the Universe, and Everything”. After much contemplation, Deep Thought reveals the answer to be simply “42”.