The Iceberg That Could Sink Your Cloud Service Product
Posted March 13, 2017 in NIST, Compliance, Cloud Security
There was an American soldier fighting in WWII. He busted the heel of one of his boots so he took them to the Army...
An Answer to Ransomware?
Posted March 8, 2017 in Blockchain, Ransomware, Cryptocurrency, Bitcoin, HIPAA, Data Breach
The IEEE and the PCHA will co-host a daylong event at HIMSS17 based on the future of Blockchain in the healthcare...
North Carolina Patient Information Exposed
Posted March 6, 2017 in Data Breach, Malware, Compliance
The information of almost 13,000 North Carolina Medicaid patients was exposed in an unencrypted email last year. The...
What the Top Ten Most Popular Passwords of 2016 Say About Us
Posted March 6, 2017 in Data Breach, Malware, Cloud Security
We have all been there before. You’re in a hurry and need to pull an attachment from an email. You log on to a...
Why Cybercriminals Attack Law Firms
Posted March 6, 2017 in HIPAA, Compliance, Data Breach
Last December, Chinese hackers tried to breach the computer systems at several big law firms including Cravath Swaine...
Did Obama Hand Russia a Parting Gift?
Posted March 2, 2017 in Data Breach, AI, Malware
When Donald Trump took office on January 20th, Barack Obama’s presidency was officially over and the country moved...
Linux Kernel Bug
Posted March 1, 2017 in Data Breach, Malware, AI
After a smaller one was discovered in January, security researcher Andrey Konovalov recently uncovered an even larger...
That's Not a Font, That's a Virus!
Posted March 1, 2017 in Ransomware, Malware, Data Breach
NeoSmart Technologies, an internet security firm, recently identified a new and very effective cyber scam that has...