ransomware

Covid-19: Ruthless Ransomware Authors Attack Hospitals

The Coronavirus outbreak continues to hold the entire world hostage, and healthcare facilities are at the forefront of this struggle. The fact that hospitals and pharmaceutical labs are overwhelmed with work and research makes them more vulnerable to malware attacks than ever before. Saving lives is their top priority and everything else comes next. Malicious actors don’t seem to care about the importance of these commendable efforts, though. They are waging a cyberwar against medical organizations as if the COVID-19 emergency weren’t underway.

healthcare cybersecurity frameworks

Cybersecurity Frameworks in Healthcare (And How to Adopt Them)

Just like any other industry, healthcare must be ready to handle cybersecurity threats.

What’s more, clinics and hospitals have to prove over and over again – the devices, technologies, and methods they use don’t bring any risk to patients. 

To do that, healthcare institutions start compiling their security with recognized standards and frameworks like NIST or HITRUST. 

But what exactly is a security framework? Which one should you use? What’s the right way to implement it?

continuous monitoring

Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring

It was our third CISO roundtable that we hosted at a local vineyard and the conversation was as lively as ever. I’m not sure if it was the wine tasting, the food or the experience of the CISO’s in attendance, but this event was lively discussion that focused on “Building a Defendable Enterprise with Continuous Monitoring”. The excitement and passion that was coming back from our attendees was nothing short of encouraging to see how these leaders in our field are taking their roles serious in defending their organizations. It was once again a privilege to be in the midst of these leaders learning from their wisdom and experience in the field. This blog is being written as recap of a few highlighted discussion points throughout evening that were discussed.

regulations

7 Cyber Regulations Your Business Don’t Prepare For (But Should Be)

The last five years have been monumental for cybersecurity. Between data breaches that have affected the world’s biggest corporations and new laws passed worldwide to ensure better data security, the increased focus on securing data is a welcome one.

However, the number of cybersecurity threats is going. According to a UK-based firm, Hiscox, 50% of surveyed firms experiences an attack, up from 40% over the same period during the past year.

threat hunting

Threat Hunting Strategies for 2020

Cyber attacks are becoming more advanced with each year, as indicated by the increase in data breaches. According to a Risk-Based Security report, 2019 might break a new record, with more than 3,800 breaches, and still counting. 

Threat hunting aims to help reduce the number of breaches. Some security analysts even take threat hunting as far as infiltrating the dark web, all to ensure they are the first to discover a new attack type. Read on for an overview of the state of cybersecurity, and key threat hunting tips for 2020. 

pen test

Pen Test vs. Vulnerability Assessment: Which is Right for my Organization?

Often, when speaking to many organizations, I often hear confusion about Pen Testing, ie: what it is, how it differs from vulnerability assessments and what are the best use cases. I’ve decided to write this blog in the hopes of helping my customers better understand these differences and use cases of each.

The cyber threat environment is dynamic and constantly evolving. There are new vulnerabilities discovered on a daily basis. Attacks are getting more sophisticated – they’re getting more complex and flying under the radar of traditional detection technologies.