Cybersecurity Blog

Featured Post

UnitedHealth Group’s Optum Subsidiary disrupted by Cyberattack putting critical patient needs at risk.

A major cyberattack has just hit the systems of a subsidiary of US health insurance giant, UnitedHealth. In an SEC filing, UnitedHealth said that it suspected a “nation-state associated cyber security threat actor” of gaining access to Change Healthcare, part of its Optum subsidiary and one of the...


( read )

Tags: cyber attack, data breach, cybersecurity,

How to protect OT from unknown vulnerability exploits 

The new generation of cybersecurity defenses must protect against never-seen-before attacks even before they are devised by the...


( read )

Tags: cyber attack, cybersecurity, data protection

The SEC just got serious about cyber incident reporting – here’s why your CISO and board should be worried

New SEC rules demand full disclosure of material cybersecurity incidents 4 days after they happen – are your OT security tools...


( read )

Tags: cyber attack, data breach, cybersecurity,

New Rules on Cybersecurity Reporting Come Into Force Next Week—Are Your Defenses Fit for Purpose?

CrowdStrike CEO George Kurtz was recently interviewed on CNBC. He declared that instances of cybercrime instigated by organized...


( read )

Tags: cyber attack, cybersecurity, data protection

Top 5 Reasons Companies Are Denied Cybersecurity Insurance

Cybersecurity insurance is an absolute necessity for any business operating in the modern world. However, increasing demand and...


( read )

Tags: cyber attack, data breach, cybersecurity,

Five Critical Capabilities You Need to Stop Ransomware Attacks

A closer look at ransomware: what is it, why is it so devastating, and why aren’t we doing a better job at preventing it? This...


( read )

Tags: cyber attack, cybersecurity, data protection,

The Top 10 Most Significant Data Breaches Of 2020

Most everyone agrees that 2020 was a loss-leader of a year. 


( read )

Tags: cyber attack, data breach, cybersecurity,

COVID-19 Surges have the Healthcare Sector Under Pressure and Under Attack

In the fall of 2020, a joint advisory from the Cybersecurity and Infrastructure Security Advisory (CISA), FBI, and Department of...


( read )

Tags: cybersecurity, intrusion response, ransomware,

What is Encryption Key Management and KMS Implementation?
To provide effective data protection and application defense and remain in compliance, organizations today need to protect their...

( read )

Tags: data breach, cybersecurity, data protection