The Concerning Risks Of Open Source Assessment Tools

It’s all around you, so you start to accept the risks. But just because open source software is everywhere doesn’t mean it’s the right choice for you and your organization. You’ve probably encountered it in your everyday life; with names like VLC Media Player, GIMP, and Audacity in the game, open source software (OSS) is […]

Ransomware Results in Expansive Data Breach

The recent flurry of ransomware attacks strikes again: at Premier Family Medical, a Utah clinic, a particular strain of ransomware has put 320,000 patients in jeopardy, which places it among one of the largest ransomware-induced breaches of 2019. The clinic reported that on July 8, the attack rendered it unable to access data from certain […]

A New Decade for Cybersecurity

For all of the astounding technological developments over the last decade, there’s still one thing the computer can’t accomplish: predicting the future. But as we usher in the new year, we also usher in a new wave of possibilities for the cybersecurity industry, and experts still have speculations abound. Technology advancing in leaps and bounds […]

The World of Cybersecurity Alliances

The ever-evolving realm of cybersecurity continues to pose a challenge for independent corporations everywhere—while federal protections are becoming increasingly advanced and fortified, companies are often charged with developing their own defense systems. So in response, tech-focused companies have spent the last few years forming cybersecurity alliances and pacts with each other. Major brands like HP, […]

Transforming Cybersecurity Culture

When it comes to bolstering your organization’s cybersecurity, there’s no harm in covering all your bases. From IT to HR, everyone is a potential target—which means that everyone should know how to defend themselves. However, it can be hard to keep up with the latest developments in cyber-defense when you’re not working on the cutting […]

Chinese Hackers Target Cancer Research

In recent months, we’ve talked about cyber attacks designed to corrupt and hold data hostage. We’ve investigated identities stolen and repurposed for sale on the black market, and taken a look at the consequences of neglecting compliance standards. However, when international forces strike in the name of industrial espionage, the game changes—and so does the […]

Tallying Healthcare Breaches

Despite leaps and bounds in cybersecurity tech, healthcare continues to be one of the most at-risk industries in the business sector. All one has to do is look at the “wall of shame,” the Department of Health and Human Services’ HIPAA Breach Reporting Tool website. Several large incidents have been added in the past few […]

Understanding Capital One’s Cybersecurity Crisis Response

Major security breaches tend to make the news for all the problems caused by the attack—but what about what we can learn from the solutions? In March, a data breach to Capital One servers exposed the personal information of nearly 106 million customers and applicants. The breach included about 140,000 Social Security numbers and 80,000 […]

Making Cybersecurity a Team Effort

When it comes to setting new standards in the world of cybersecurity, teamwork has proven itself to be invaluable. From private companies to foreign allies, U.S. lawmakers are pushing for cooperation in creating decisive policies to address some of cybersecurity’s biggest dilemmas, including baseline standards for connected devices, 5G, and incident response. Jason Boswell, head […]

Examining Top Two Cybersecurity Threats

In the digital age, the ability to review and respond to cyber threats is more important than ever. And as healthcare systems become increasingly reliant on technology, cyber attacks become more prevalent risks, particularly with the uptick in new methods designed to infiltrate your networks. To minimize the risk of successful attacks, IT security teams […]