How Our Pharmacy Group Has Readied Secure HIPAA-Compliant WFH Policies
If anticipating a hybrid or remote workforce in the post-pandemic era, here are three best practices to ensure security By Marshall Frost, VP of Corporate Systems, Avita Pharmacy At our…
All the User Experience, None of The Security?
EU telcos gather a lot of highly sensitive customer information. New research suggests it’s not as well protected as you might think. By Deepika Gajaria, Vice President of Product, Tala…
In the Midst of COVID-19, We’re Seeing a Pandemic of Cyber Attacks
By Babur Khan, Technical Marketing Engineer – Enterprise Security at A10 Networks In the first quarter of 2021, the COVID-19 pandemic is still wreaking havoc around the globe. The coronavirus…
Why A ‘Layers and Lists’ Approach to Cybersecurity Is Doomed to Fail
By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find…
New Report Shows Over Two Million Secrets Detected on Public GitHub in 2020 and a 20% growing trend Year-Over-Year.
By Jeremy Thomas, GitGuardian CEO When we started working on GitGuardian’s detection algorithm and got the first detection results, we could not believe it. We were facing a very counterintuitive…
Securing Patient Private Information in The Age of Shared Information
By Christian Gitersonke, CEO, Health Insurance Answers The Problem Theft of Private Health Information (PHI) has been around almost as long as healthcare in this country. As technology has evolved…
ChaChi, a GoLang Trojan used in ransomware attacks on US schools
A new Trojan written in the Go programming language, tracked as ChaChi, was involved in ransomware attacks against government agencies and US schools. Researchers from BlackBerry Threat Research and Intelligence…
Overcoming Security as a Barrier to Cloud Adoption
By Ron Newman, SVP at NTT Ltd. Security Division The last year has forced organizations into change, both planned and unplanned. Companies have had to pivot, rethink their business strategies…
Threat actors in January attempted to poison the water at a US facility
Threat actors in January attempted to poison the water at a US facility, a circumstance that highlights the importance of cybersecurity for water and wastewater utilities. The news that a…
Open XDR vs. SIEM
Matching Resources and Business Risk with the Right Solution Gaining visibility and responding to attacks across the entire enterprise infrastructure (endpoints, servers, applications, SaaS, cloud, users, etc.) is a very…
Norway blames China-linked APT31 for 2018 government hack
Norway police secret service states said that China-linked APT31 group was behind the 2018 cyberattack on the government’s IT network. Norway’s Police Security Service (PST) said that the China-linked APT31…
Time Is Money: How to Minimize Data Breach Damages with Early Detection
In the current landscape of cybersecurity, most CISOs have come to understand that breaches are inevitable – however, with early detection and remediation, organisations can significantly reduce the harmful impacts…