In today’s hyper-connected world, where information flows freely and technology permeates every aspect of our lives, the need for robust cybersecurity measures has never been more critical. Cyber threats continue to evolve at an alarming rate, targeting individuals, businesses, and even nations. As cybercriminals employ increasingly sophisticated tactics, organizations must cultivate resilience to withstand and […]
Within a matter of days, the vulnerability to Log4j (versions 2.0 to 2.14.1), which provides Java library logging capabilities sent shockwaves through the corridors of businesses from the boardroom to the data center. The zero-day attack known as “Log4Shell” (CVE-2021-44228) is concerning on a number of fronts that differ from previous high-profile attacks. The sheer […]
Compliance audits can be quite intimidating, especially if you’re new to them. For many organizations, it’s something that’s becoming increasingly unavoidable. In this post, we introduce you to the various aspects of an audit, what an auditor expects from you (the complying organization), and what you can do to make the auditing process as smooth […]
Threat Analyst Lead Yaz Johnston dives into our latest security insights, where you can learn about upcoming HTML sanitization for your favorite web browsers, what top 10 malware threats we’ve seen in the past quarter, and how ransomware continues to steal the security spotlight. HTML Sanitization Google, Mozilla, and security firm Cure53 announced they are […]
Joint Blog with HIPAATrek, Co-Author: Sarah Badahman, CHPSE, CEO/Founder, HIPAAtrek Office culture has greatly evolved over the years, impacted by generational differences, laws and legislature, and even design aesthetics. And as technology has changed, one of the most impactful influences on office culture has been digital transformation. Fueled by growing usage of applications, remote work […]
Joint Blog with HIPAATrek, Co-Author: Sarah Badahman, CHPSE, CEO/Founder, HIPAAtrek While medical treatment innovation may move at the speed of light, the same cannot be said for the rates at which healthcare providers have migrated to the cloud. The largest obstacle to widespread adoption? The responsibility of securing their data within the cloud. And the […]
$GME (GameStop) and $AMC (AMC Entertainment) are breaking the market. These two stocks, driven by retail investor hype, have created pandemonium on Wall Street. Hedge funds are going bankrupt, and brokers are overwhelmed. None seem more overwhelmed than the SaaS brokerages like Stash App and Robinhood. Stash App has slowed to a crawl if you […]
Change Catalyst: Armor Hero Cheryl Gant For Armor Hero Cheryl Gant, diversity and representation has always been important. And though she has followed an unconventional path into her technology career, this Armor Hero has made herself at home and taken up the call to help move Armor’s diversity and inclusion efforts onward and upward. As […]
By Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP), CCSFP, Member (FBI) InfraGard & HITRUST CSF® Assessor Council Executive Summary In the future, when we look back, this Equifax data breach very well could be the tipping point for cybersecurity. A watershed moment. Cybersecurity, for the next few years, will be a significant “C” level priority. Executives […]
By Jason Newman, Chief Information Security Officer at Blue Cross and Blue Shield of Minnesota I’m a VP and chief information security officer for Blue Cross and Blue Shield of Minnesota (Blue Cross). In my role, I am responsible for information security, IT risk management, business resilience, and crisis management within Blue Cross. HITRUST: How […]
This white paper looks at the types of tools, people, and financial resources needed to operate a highly functioning SOC, and the qualities needed for either an in-house or outsourced SOC to be effective.