Cybersecurity
HIPAA Compliance: Why It Matters and How to Obtain It
What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) of 1996 Security Rule established standards for protecting individuals’ electronic personal health information (PHI) (which includes any identifiable health information, such ...
CVE-2023-48788 Vulnerability Reported in FortiClientEMS
Fortinet’s FortiClient EMS product exploited via CVE-2023-48788, a critical SQL injection vulnerability : OFFICIAL CVE-2023-48788 PATCHING INFORMATION : The CISA (Cybersecurity and Infrastructure Security Agency) has alerted organizations to actively exploit ‘The ...
Embrace Generative AI for Security, But Use Caution
Generative AI will be a net positive for security, but with a large caveat: It could make security teams dangerously complacent ...
The Professionalism of Cybercrime
In decades past, cybercriminals were a diverse bunch. From hacktivists and hobbyists to grudge-bearing employees and opportunists, organizations suffered at the hands of a broad range of threat actors with a full ...
Cybersecurity a Top Priority for Audit Committees
Audit committees consider cybersecurity their primary oversight focus as the SEC enforces tougher cyberattack disclosure regulations ...
On Secure Voting Systems
Andrew Appel shepherded a public comment—signed by twenty election cybersecurity experts, including myself—on best practices for ballot marking devices and vote tabulation. It was written for the Pennsylvania legislature, but it’s general ...
What Is Allowlisting?
Keeping our digital world secure is more critical than ever as cyberthreats grow faster than we can track. Every businessRead More The post What Is Allowlisting? appeared first on Kaseya ...
ChatGPT Plugin Security Vulnerabilities Exploited By Hackers
In the realm of cybersecurity, constant vigilance is paramount as threat actors perpetually seek novel ways to exploit vulnerabilities. Recent research has shed light on a concerning trend: the potential misuse of ...
The Next Evolution of IAM: How Generative AI is Transforming Identity and Access
The shift towards AI-powered IAM promises to enhance security, improve user experiences, and simplify complex access management tasks ...
Is it time to enforce an Authority-to-Operate (ATO) for Healthcare Organizations?
The Change Healthcare security breach has impacted over 94% of hospitals as reported by the American Health Association (AHA). A cascading set of events was unleashed starting with the Feb 21, 2024 ...