Targeted Attacks: Increase Focus on Healthcare
In the last six months there has been one industry that has been in the limelight for being attacked and breached at a greater rate than...
Don’t Automatically Provide Private Data
Data in its various forms have distinct value. The value is to the owner of the data in that if it were to leave the company in an...
InfoSec Recruiters Recommendations
In this industry, there is an ample movement with positions and new positions to fill. At times people are not always happy with the...
Steganography-Still Active
The act of hiding a message may be tracked historically at least to the time of Caesar with their rudimentary cryptography when sending...
Cybersecurity self-assessment tool for small businesses
National Institute of Standards and Technology (NIST) projects are size neutral. While their tools are often used by large organizations,...
Autonomous Vehicles: Here They Come
Over the last few years vehicles certainly have been upgraded. The latest of vehicles on the road, connectedness has been the focus....
Emails...trouble waiting in cyberspace
The bruising Presidential election of 2016 does provide one positive note if nothing else. It demonstrates to every person paying...
Vendors Still Need to be Monitored
With time, the vulnerabilities from aps continue to grow. As these became known, patches are created and pushed. This has tended to be a...
Breached EHR: A Gift that Keeps on Giving
Health facilities are enumerated and attacked with regularity due to the target, medical records, having a distinct value. Another...
Cloud Computing and HIPAA Guidelines
As healthcare organizations across the country scramble to take advantage of the power of the cloud, Health and Human Services (HHS) is...