Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Connecticut College Announces Breach Investigations from March 2023

Connecticut College (CC) is a private campus institution in New London, CT; initially opened as a women’s college, the institution today serves a 2k-student population and offers more than 40 degree programs. In March 2023, cybercriminals victimized CC by accessing their network environment. Eleven months later, CC officials have begun sending impact notices to those with data exposed in the incident.

PJ&A Transcription Releases Update; 13.3 Million Exposures from 2023 Breaches

Perry Johnson & Associates (PJ&A) is a medical transcription organization based in Nevada. Since the public learned about PJ&A’s breach, we have featured it whenever large healthcare networks have announced data breaches stemming from their incident and when officials present updates. This week, more information is public about the incident, through the Maine Attorney General’s Office.

Unified Identity - look for the meaning behind the hype!

If you've listened to software vendors in the identity space lately, you will have noticed that "unified" has quickly become the buzzword that everyone is adopting to describe their portfolio. And this is great! Unified identity has some amazing benefits! However (there is always a however, right?) not every "unified" "identity" "security" "platform" is made equal.

The Complete Guide to Data Detection and Response (DDR)

In the 21st century, the lifeblood of several multi-billion dollar corporations is the data of their users they possess and how they go upon it, whether it be including new policies benefitting the users of their platform, or finding more aspects of data they can take to their advantage to increase their profit margins ever so slightly? All of the above requires data in the baseline.

HIPAA Compliance in the Age of AI - A Comprehensive Guide

The healthcare landscape is undergoing a transformative journey as it intersects with the mighty realm of artificial intelligence (AI). This comprehensive guide navigates the intricate dance between compliance with the Health Insurance Portability and Accountability Act (HIPAA) and the increasing integration of AI in healthcare. In the evolving tapestry of medical practices, AI emerges as a pivotal player, influencing patient care and administrative processes.

4 Key Ways IT Leaders Can Build a Strong Tech Team

IT leaders play a significant role in the success of a tech company. IT leaders are key persons for driving digital transformation, aligning IT with business strategy, fostering innovation, managing IT talent and imperative change agents within an organisation. Life has taken a different course post-COVID-19 pandemic and has resulted in a myriad of changes in almost every aspect of life, even in the lives of IT leaders.

Top 8 Cybersecurity Trends for 2024

In 2023, cyberthreats increased and diversified, resulting in increased security challenges for organizations around the globe. Meanwhile, AI greatly increased its presence in the realm of cybersecurity. It’s time to look ahead and focus on the anticipated cybersecurity threats and trends in 2024. What can we expect from threat actors and security specialists in the upcoming year? Read on and find out!

What is XML External Entity, How to Find XXE Vulnerabilities and Patch Them

An XXE vulnerability is a security vulnerability that allows attackers to access sensitive data or execute malicious code in a web application. This happens when the application accepts XML input from an untrusted source and doesn’t properly validate it. An attacker can exploit this vulnerability by crafting a special XML input that includes a reference to an external resource (like a file or URL) that they control.

5 Strategies for Protecting the Public and Private Sectors from Cybersecurity Threats

The proliferation of technology in the present age, while undeniably a win for innovation and modern convenience, has unfortunately been paralleled by an upsurge in cyber threats that present a multifaceted challenge to both businesses and individuals. As people become more reliant on digital platforms for everything from commerce to communication, the potential for cyberattacks will only escalate.

APIs and automation: The good, the bad, and the better

APIs are often adopted by businesses as a way to automate certain operational tasks. This not only helps to introduce efficiencies, it also reduces the chance of human error in repetitive, manual actions. But the relationship between APIs and automation doesn’t end there. To streamline the API management process, developers have started automating a variety of tasks in the API lifecycle, from development to production.