The 5 Elements to Effectively Managing HIPAA Compliance
Managing Patient Data (PHI) Sprawl In 1996, the Health Insurance Portability and Accountability Act (HIPAA) created...
Continue ReadingPhishing and Wire Transfer Scams are Victimizing Corporate Executives
“CEO Fraud” or “CEO Fraud Phishing” Doubled Over the Past Year CEO Fraud is a scam...
Continue ReadingHow to Improve Your SOCs Effectiveness – Part 1
How to Improve Security Operation Center (SOC) Effectiveness – Part 1 So many articles and blog...
Continue ReadingWhy and How DNS Hijacking is Increasing
The IDC Global DNS Threat Report released last summer revealed that 82% of organizations were victims...
Continue ReadingAre Organizations Ready for The California Consumer Privacy Act (CCPA)?
Why Organizations Aren’t Ready for the California Consumer Privacy Act (CCPA) The California Consumer Privacy Act...
Continue Reading2020 Top 5 Cyber Security Predictions
Top 5 Cyber Security Predictions for 2020 In conversations with industry analysts, our customers, combing through...
Continue ReadingThe Best IT Security Blog Posts in 2019
The Top 5 Cybersecurity Blog Posts in Our Library – 2019 We have added 46 Blog...
Continue ReadingThe Benefits of Using a SIEM to Improve IT Security
A SIEM’s Role in Network Security Analysis and Monitoring We put together a series of blog...
Continue ReadingWhy Log Monitoring and Management is Critical to IT Security
Why Log Monitoring and Management is Critical to IT Security In our last blog post titled...
Continue ReadingMagecart Campaigns are Targeting e-Commerce Websites
Magecart is Threatening Online Businesses this Holiday Season As we suggested in an earlier blog post,...
Continue Reading