Cyber Threats October 3, 2025 Cyberattack at Jaguar Land Rover Creates Major Industrial Crisis in the UK A cyberattack of unprecedented scale has been paralyzing the British automotive giant Jaguar Land Rover since the end of August 2025, plunging one of the ... Read more
Trends & Reports September 13, 2024 Texas challenges HHS HIPAA rule on reproductive health privacy Texas Attorney General has filed a lawsuit against the U.S. Department of Health and Human Services (HHS) challenging the new HIPAA rule on reproductive healthcare ... Read more
Insights July 4, 2024 HIPAA Compliance for Email HIPAA compliance for email involves not only ensuring that the systems used to send, receive, and store emails support HIPAA compliance, but also that members ... Read more
Tools & Practices January 26, 2024 User Authentication: Key Methods to Secure Online Access in 2024 User authentication has evolved significantly, with multi-factor authentication (MFA) becoming a standard security practice in 2024. Beyond traditional MFA, advancements in technology have introduced more ... Read more
Security Breaches January 24, 2024 The Impact of Artificial Intelligence on Cybersecurity and Cyber Attacks Artificial intelligence (AI) is reshaping the cybersecurity landscape. A recent UK National Cyber Security Centre’s report highlights AI’s potential to significantly enhance cyber threats, especially ... Read more
Trends & Reports January 23, 2024 ScarCruft Intensifies Cyber Espionage, Targeting Cybersecurity Experts In the constantly evolving cyber threat landscape, the North Korean APT group “ScarCruft” has emerged as a formidable adversary. The recent SentinelOne report unveils the ... Read more
Cyber Threats January 19, 2024 Inferno Drainer: A $80 million crypto heist and the rising threat of crypto-drainers The digital finance sector has witnessed a significant breach in 2023 with the advent of the Inferno Drainer campaign. Over the past year, this sophisticated ... Read more
Insights December 2, 2023 HIPAA Compliance Checklist The purpose of a HIPAA compliance checklist is to support the good faith efforts of covered entities and business associates to comply with the applicable ... Read more
Insights December 30, 2022 HIPAA Violation Examples The HIPAA violation examples that most often make the headlines are data breaches involving thousands of records that result in six- or seven-figure settlements. However, ... Read more
Insights November 8, 2022 What is HIPAA Compliance? Although most individuals and organization in healthcare-related industries will be aware of HIPAA and the legal requirement to comply with its regulations, there may be ... Read more
Insights September 2, 2022 Phishing Attack Examples Phishing is the most common way that cybercriminals reach employees. These attacks use social engineering techniques to trick employees into taking actions that help the ... Read more
Insights October 27, 2021 Best Open Source Cybersecurity Tools There are many open source cybersecurity tools that IT security professionals can use to identify vulnerabilities before they are discovered and exploited by hackers. Using ... Read more
Insights July 11, 2018 HIPAA Training In order to be compliant with the Health Insurance and Portability Act (HIPAA), Covered Entities (CEs) must provide HIPAA compliance training. This requirement is codified ... Read more
Insights November 8, 2017 HIPAA Laws A Guide to the HIPAA Laws Most individuals and organizations in healthcare-related industries are aware they have to comply with the HIPAA laws. However, as ... Read more
Insights June 20, 2017 What is Phishing? Phishing attacks are regularly headline news, but what is phishing, how does it affect organizations and why are cybercriminals now turning to phishing as the ... Read more
Insights June 20, 2017 How to Protect Against Phishing Considering the volume of IT security articles published on the Internet, you might expect everyone would know how to protect against phishing. Right? Wrong. Phishing ... Read more