The U.S. Department of Health and Human Services (HHS), through its Office for Civil Rights (OCR), reached a settlement with…
Risk Assessment
We all know what is meant by Access Control. Pretty easy to figure out? There are all kinds of access…
We cannot forget about Change Management in today’s crazy, dangerous and very much evolving digital frontier. I think all the…
Seemingly Benign Programs used for Hacking Hackers use seemingly benign programs for Nefarious Purposes. Hackers manipulate and repurpose software and…
Introduction In the quest to strengthen cybersecurity defenses, organizations have turned to various solutions such as SIEM, XDR/MDR, and SOAR….
Healthcare spending in the U.S. — which is the highest among developed countries — accounts for 18 percent of the…
Major US Hospital Chain Hacked By What May Be Ransomeware A computer outage at a major hospital chain thrust…