The Professionalism of Cybercrime

The Professionalism of Cybercrime

In decades past, cybercriminals were a diverse bunch.  From hacktivists and hobbyists to grudge-bearing employees and opportunists, organizations suffered at the hands of a broad range of threat actors with a full spectrum of interests, motivations, and rationalizations. However, as we explored in last year's report, today's threat actors are, ... Read More
What is Compliance in Cybersecurity? Frameworks and Best Practices

What is Compliance in Cybersecurity? Frameworks and Best Practices

| | Compliance
If you're secure, are you compliant? If you're compliant, are you secure? ... Read More
CMMC Compliance Basics: 4 Steps to Success

CMMC Compliance Basics: 4 Steps to Success

| | LL-CMMC
The Cybersecurity Maturity Model Certification (CMMC) provides a structured approach to safeguarding sensitive information and ensuring the resilience of defense supply chains. Whether you're a defense contractor navigating compliance or an organization aiming to bolster your cybersecurity posture, understanding the basics of CMMC is the first step toward success ... Read More
5 Facts About File Integrity Monitoring and HIPAA Integrity Controls

5 Facts About File Integrity Monitoring and HIPAA Integrity Controls

The risks of being found non-compliant with HIPAA guidelines are among the most pressing issues for healthcare IT professionals. In the event of a data breach, HIPAA fines can exceed $1.5 million. The Department of Health and Human Services Office for Civil Rights (OCR) conducts random HIPAA audits involving written ... Read More
ANSWERED: How Much Does CMMC Certification Cost?

ANSWERED: How Much Does CMMC Certification Cost?

| | Compliance, LL-CMMC
The Cybersecurity Maturity Model Certification (CMMC) is a crucial framework for organizations looking to do business with the DoD and continuously safeguard sensitive information. Whether it's your first time working with CMMC or you're a pro, one question always emerges: How much does CMMC certification cost? In this article, we'll ... Read More
Cloudflare Breached by Nation-State Hackers

Cloudflare Breached by Nation-State Hackers

| | cybercrime, Podcast
In a recent podcast interview with Cybercrime Magazine's Host, Charlie Osborne, Scott Schober, Cyber Expert, Author, and CEO of Berkeley Varitronics Systems, discusses the latest breach at Cloudflare, which has since been attributed to nation-state hackers. The podcast can be listened to in its entirety below ... Read More
When is PCI Required? (+ 4 Tips for Maintainig Compliance)

When is PCI Required? (+ 4 Tips for Maintainig Compliance)

Payment card data is the most commonly targeted information by cybercriminals. Keeping your customers' payment card information safe is a top priority as cyber threats become more sophisticated and advanced. That's where the Payment Card Industry Data Security Standard (PCI DSS) comes in, setting the security standard for businesses to ... Read More
Top 4 Upcoming Compliance Deadlines - What to Know to Stay Ahead

Top 4 Upcoming Compliance Deadlines – What to Know to Stay Ahead

Staying on top of compliance requirements is crucial for organizations to protect sensitive data and maintain the trust of their stakeholders. As we dive into 2024, several important compliance deadlines loom on the horizon. In this article, we'll explore the top upcoming deadlines for cybersecurity compliance and what organizations need ... Read More
Global Data Storage Predictions

Global Data Storage Predictions

| | Podcast
In a recent podcast interview with Cybercrime Magazine's Host, Charlie Osborne, Heather Engel, Managing Partner at Strategic Cyber Partners, discusses the global data storage predictions from Cybersecurity Ventures. The podcast can be listened to in its entirety below ... Read More
Ardent Health Services Breach

Ardent Health Services Breach

| | Podcast
In a recent podcast interview with Cybercrime Magazine's Host, Heather Engel, Scott Schober, Cyber Expert, Author, and CEO of Berkeley Varitronics Systems, discusses the recent breach of Ardent Health Services and Epic, a widely used hospital electronic medical records management system. The podcast can be listened to in its entirety ... Read More