Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Empowering a Secure Digital Future with Centripetal Ireland During Cybersecurity Awareness Month

In today’s digital world, the importance of cybersecurity is more critical than ever. With the constant evolution of cyber threats, safeguarding sensitive data and digital assets has transitioned from an option – to an absolute necessity. Each October, Cybersecurity Awareness Month focuses on the importance of cybersecurity in our interconnected world.

New in Calico Cloud: Continuously scan workloads in Kubernetes clusters to detect newly discovered CVEs

The timeline of an application can be broadly described in 3 phases: Thus, runtime security in the context of a cloud-native container environment broadly refers to the tools and processes leveraged to protect the operation of running containers in production.

Adhere to Firmer Study Archival Requirements with Egnyte's eTMF

Fines and penalties for regulatory noncompliance within biopharma have been well documented. Since 2000, violations for noncompliance have cost biopharma $50B—and the costs of addressing root causes of noncompliance have grown as well, climbing by more than 40% since 2011 according to some estimates. The costs of remediating a deficiency can vary considerably, from as little as $250K to $5M for a Form 483 cited deficiency.

Texas Medical Center Leaks Patient Information Following Data Breach

In South Texas, United Medical Centers (UMC) offer reliable, high-quality healthcare services. They host nine locations in the region, servicing patients from the surrounding communities; their services include options for family planning, WIC, and a broad selection of care to assist chronic illnesses. The clinics provide care to more than 34,184 patients in the area, where many use public insurance to receive services.

Network Monitor, LiveAction, Announces Ransomware Incident

LiveAction Incorporated is a software company specializing in analytics, network monitoring, and application management tools. They’ve reported a revenue of over $5 million and provide services to companies in various industries; technical manufacturers, hospitals, biotechnology, and transportation professionals all use LiveAction services. Earlier this year, LiveAction suffered a ransomware attack where hackers took significant consumer information.

National Behavioral Health Clinic Suffers Ransomware

Deer Oaks Behavioral Health is a national provider of mental health based in San Antonio, Texas. They offer the nation long-term care focused on psychiatry and psychology. Deer Oaks hosts more than 1,500 facilities nationwide. Their services include medication and medical treatment planning while spearheading new techniques for rural tele-behavioral health.

NYDFS Regulatory Changes: Vulnerability Management and Risk Assessment

The financial sector is constantly adapting to emerging threats and regulatory changes. The New York Department of Financial Services (NYDFS) is at the forefront of cybersecurity regulation, ensuring that covered entities within the state maintain robust cybersecurity programs. In this blog post, we’ll dive into the recent changes to NYDFS regulations, specifically focusing on vulnerability management and an updated definition of risk assessment.

The Importance of SSL Certificate for an E-Commerce Website in 2024

With the advent of technological advancement and everyday upgrades, safety measures and security updates have become more than important. Imagine holding a savings account in a bank that explicitly declines to keep your money safe. Or sending sensitive information over a platform that has no end-to-end encryption. Or renting a property that has no lock. Sounds unsafe, right?

Enhance your cloud security with MITRE ATT&CK and Sumo Logic Cloud SIEM

As cloud applications and services gain prominence amongst organizations, adversaries are evolving their toolset to target these cloud networks. The surge in remote work and teleconferencing presents unprecedented opportunities for nefarious activities. Enter the MITRE ATT&CK Framework, also known as a MITRE ATT&CK Matrix—a treasure trove for defending cloud infrastructure and on-premises infrastructure against the newest adversary tactics, techniques, and procedures (TTPs).

Okta evolving situation: Am I impacted?

Cybersecurity is never boring. In recent months, we’ve seen major cyberattacks on Las Vegas casinos and expanded SEC cybersecurity disclosure rules are top of mind. Is it any wonder we consistently recommend taking a proactive approach to secure your environment with a defense-in-depth strategy and appropriate monitoring? News outlets reported the recent compromise at the Identity and Authentication (IAM) firm, Okta.