Vector illustration of the medical team.

HIPAA Compliance: Why It Matters and How to Obtain It

What is HIPAA? The Health Insurance Portability and Accountability Act (HIPAA) of 1996 Security Rule established standards for protecting individuals’ electronic personal health information (PHI) (which includes any identifiable health information, such ...

CVE-2023-48788 Vulnerability Reported in FortiClientEMS

Fortinet’s FortiClient EMS product exploited via CVE-2023-48788, a critical SQL injection vulnerability : OFFICIAL CVE-2023-48788 PATCHING INFORMATION : The CISA (Cybersecurity and Infrastructure Security Agency) has alerted organizations to actively exploit ‘The ...
generative AI security, Microsoft AI cybersecurity

Embrace Generative AI for Security, But Use Caution

Generative AI will be a net positive for security, but with a large caveat: It could make security teams dangerously complacent ...
Security Boulevard
The Professionalism of Cybercrime

The Professionalism of Cybercrime

In decades past, cybercriminals were a diverse bunch.  From hacktivists and hobbyists to grudge-bearing employees and opportunists, organizations suffered at the hands of a broad range of threat actors with a full ...
data, compliance, audit Box data security, management, organizations, GDPR, Strike Force privacy, vendors, RFPs, cloud, data security DLP Iran DUMPS Conti Hackers Sandbox government HackerOne IBM data security

Cybersecurity a Top Priority for Audit Committees

Audit committees consider cybersecurity their primary oversight focus as the SEC enforces tougher cyberattack disclosure regulations ...
Security Boulevard

On Secure Voting Systems

Andrew Appel shepherded a public comment—signed by twenty election cybersecurity experts, including myself—on best practices for ballot marking devices and vote tabulation. It was written for the Pennsylvania legislature, but it’s general ...
What Is Allowlisting?

What Is Allowlisting?

Keeping our digital world secure is more critical than ever as cyberthreats grow faster than we can track. Every businessRead More The post What Is Allowlisting? appeared first on Kaseya ...

ChatGPT Plugin Security Vulnerabilities Exploited By Hackers

In the realm of cybersecurity, constant vigilance is paramount as threat actors perpetually seek novel ways to exploit vulnerabilities. Recent research has shed light on a concerning trend: the potential misuse of ...
Is it time to enforce an Authority-to-Operate (ATO) for Healthcare Organizations?

Is it time to enforce an Authority-to-Operate (ATO) for Healthcare Organizations?

| | ATO, Blog, Cybersecurity, healthcare
The Change Healthcare security breach has impacted over 94% of hospitals as reported by the American Health Association (AHA). A cascading set of events was unleashed starting with the Feb 21, 2024 ...