The Professionalism of Cybercrime
In decades past, cybercriminals were a diverse bunch. From hacktivists and hobbyists to grudge-bearing employees and opportunists, organizations suffered at the hands of a broad range of threat actors with a full spectrum of interests, motivations, and rationalizations. However, as we explored in last year's report, today's threat actors are, ... Read More
What is Compliance in Cybersecurity? Frameworks and Best Practices
If you're secure, are you compliant? If you're compliant, are you secure? ... Read More
CMMC Compliance Basics: 4 Steps to Success
The Cybersecurity Maturity Model Certification (CMMC) provides a structured approach to safeguarding sensitive information and ensuring the resilience of defense supply chains. Whether you're a defense contractor navigating compliance or an organization aiming to bolster your cybersecurity posture, understanding the basics of CMMC is the first step toward success ... Read More
5 Facts About File Integrity Monitoring and HIPAA Integrity Controls
The risks of being found non-compliant with HIPAA guidelines are among the most pressing issues for healthcare IT professionals. In the event of a data breach, HIPAA fines can exceed $1.5 million. The Department of Health and Human Services Office for Civil Rights (OCR) conducts random HIPAA audits involving written ... Read More
ANSWERED: How Much Does CMMC Certification Cost?
The Cybersecurity Maturity Model Certification (CMMC) is a crucial framework for organizations looking to do business with the DoD and continuously safeguard sensitive information. Whether it's your first time working with CMMC or you're a pro, one question always emerges: How much does CMMC certification cost? In this article, we'll ... Read More
Cloudflare Breached by Nation-State Hackers
In a recent podcast interview with Cybercrime Magazine's Host, Charlie Osborne, Scott Schober, Cyber Expert, Author, and CEO of Berkeley Varitronics Systems, discusses the latest breach at Cloudflare, which has since been attributed to nation-state hackers. The podcast can be listened to in its entirety below ... Read More
When is PCI Required? (+ 4 Tips for Maintainig Compliance)
Payment card data is the most commonly targeted information by cybercriminals. Keeping your customers' payment card information safe is a top priority as cyber threats become more sophisticated and advanced. That's where the Payment Card Industry Data Security Standard (PCI DSS) comes in, setting the security standard for businesses to ... Read More
Top 4 Upcoming Compliance Deadlines – What to Know to Stay Ahead
Staying on top of compliance requirements is crucial for organizations to protect sensitive data and maintain the trust of their stakeholders. As we dive into 2024, several important compliance deadlines loom on the horizon. In this article, we'll explore the top upcoming deadlines for cybersecurity compliance and what organizations need ... Read More
Global Data Storage Predictions
In a recent podcast interview with Cybercrime Magazine's Host, Charlie Osborne, Heather Engel, Managing Partner at Strategic Cyber Partners, discusses the global data storage predictions from Cybersecurity Ventures. The podcast can be listened to in its entirety below ... Read More
Ardent Health Services Breach
In a recent podcast interview with Cybercrime Magazine's Host, Heather Engel, Scott Schober, Cyber Expert, Author, and CEO of Berkeley Varitronics Systems, discusses the recent breach of Ardent Health Services and Epic, a widely used hospital electronic medical records management system. The podcast can be listened to in its entirety ... Read More