Real Risks of Penalties from Failure of HIPAA Compliance
The Health Insurance Portability and Accountability Act (HIPAA) was signed into law close to three decades ago. HIPAA was initially comprised of two primary rules: (1) The Privacy Rule, which establishes standards to protect individuals' [...]
What are the Impacts of AI on Cybersecurity?
AI is a double-edged sword in cybersecurity. While it provides powerful tools for defending against cyber threats, it also poses new challenges as cybercriminals adopt AI-driven techniques. AI and Cybersecurity - Potential Threats Automated Attacks: [...]
Water & Wastewater Cybersecurity: Mitigating Risks for Critical Infrastructure
Water and wastewater systems are part of the critical infrastructure of any nation, which makes them prized targets for physical and cyberattacks. These attacks can disrupt, and potentially [...]
Lockbit 3.0 Hits Japan’s Largest Trading Port
On the morning of July 4th, 2023, the Nagoya Harbor Transportation Authority in Japan had trouble accessing their central computer systems and discovered that they had been hacked by LockBit 3.0 ransomware. The ransom demand [...]
IT Monitoring Tool Sprawl Hurts Business Operations
IT monitoring tool sprawl refers to the proliferation of multiple monitoring tools within an organization’s IT infrastructure. While monitoring tools are essential for maintaining the performance, availability, and [...]
BlackSuit Ransomware Targeting Linux and Windows
A new ransomware strain that was discovered in early May 2023 has shown a strong resemblance to Royal ransomware. This new strain BlackSuit, primarily targets Linux systems and Windows. Further analysis from cybersecurity company Trend [...]
I am text block. Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Hello






