Subscribe
EHR Outages: Hidden Risks to Patient Safety

EHR Outages: Hidden Risks to Patient Safety


Posted July 26, 2016 in HIPAA, Ransomware, NIST, Data Breach

Electronic health record outages threaten patient care and compliance. Learn how hospitals can prevent costly EHR...

Security Analyst Careers: High Demand, Top Salaries

Security Analyst Careers: High Demand, Top Salaries


Posted July 26, 2016 in Ransomware, HIPAA, Data Breach

Information security analyst jobs are booming due to rising cyber threats. Explore career opportunities, salary data,...

5 Critical Cybersecurity Gaps in Healthcare

5 Critical Cybersecurity Gaps in Healthcare


Posted July 26, 2016 in Ransomware, HIPAA, Malware, Data Breach

A two-year study reveals healthcare organizations are dangerously unprepared for cyberattacks. See the top 5 concerns...

Why SMS Two-Factor Authentication Is No Longer Safe

Why SMS Two-Factor Authentication Is No Longer Safe


Posted July 26, 2016 in Data Breach, Malware, Cloud Security

Text-based two-factor authentication is being phased out due to security risks. Learn why SMS codes are vulnerable...

DNC Email Hack: Russian Hackers Behind the Breach?

DNC Email Hack: Russian Hackers Behind the Breach?


Posted July 26, 2016 in Data Breach, Digital Forensics, Cloud Security

Nearly 20,000 DNC emails leaked by WikiLeaks, with Russian hackers suspected. Analyze the evidence and understand the...

DNC Email Leak Exposes Cybersecurity Hypocrisy

DNC Email Leak Exposes Cybersecurity Hypocrisy


Posted July 25, 2016 in Malware, Data Breach, Compliance

DNC staffers mocked a cybersecurity warning just months before their system was hacked. See the ironic emails exposed...

Snowden Designs Anti-Surveillance Phone Device

Snowden Designs Anti-Surveillance Phone Device


Posted July 23, 2016 in Data Breach, AI, Malware

Edward Snowden unveils a hardware device designed to detect phone surveillance. Learn how this anti-spying technology...

Locky Ransomware Now Works Offline: What to Know

Locky Ransomware Now Works Offline: What to Know


Posted July 22, 2016 in Ransomware, Malware, Cloud Security

The Locky ransomware strain now encrypts files without an internet connection. This dangerous evolution makes it...