Subscribe

Data Breach Impacts Nearly 400,000


Posted December 30, 2016 in Compliance, Data Breach, Digital Forensics

On November 7 of this year, Community Health Plan of Washington (CHPW), a nonprofit Medicaid-based health insurance...

What You Need to Know About Watering Hole Attacks

What You Need to Know About Watering Hole Attacks


Posted December 29, 2016 in Malware, Data Breach, Cloud Security

We may never know exactly what happened to American electorate system during 2016, who was responsible, or how it...

Would You Let a Nurse Perform Your Heart Surgery?


Posted December 29, 2016 in Data Breach, Compliance, Cloud Security

Would you sign off on a room nurse performing open heart surgery on you? No, right? Then why do you buy devices that...

How Industry Security Standards Can Cut Out Human Error


Posted December 29, 2016 in Data Breach, HIPAA, Compliance, Malware

The best part of the holidays is that the entire family is in one place, making for some great bonding experiences....

The Government’s HIPAA Guidelines Decoded


Posted December 29, 2016 in HIPAA, Compliance, Data Breach

When you’re looking for clarity and conciseness, there’s two places you don’t want to go: Legal guidelines and...

Spyware in the Real World


Posted December 29, 2016 in Compliance, Malware, Data Breach

When people think of hackers, they think of greasy people stuck to a computer in dark basements all over the world....

Three Chinese Hackers Made $4M off US Law Firms

Three Chinese Hackers Made $4M off US Law Firms


Posted December 28, 2016 in Malware, Data Breach, Compliance

You don't have to sell stolen personal data on the Dark Web, hold files for ransom or perform DDoS attacks for money...

One Ukrainian’s Sad Story of Cybersecurity


Posted December 28, 2016 in Malware, Data Breach, Compliance

When someone says cyberwarfare, you probably think of computers and servers as the soldiers and the casualties being...