Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Five worthy reads: Hello from the dark side-the nefarious nature of voice AI technology

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we are exploring voice-activated AI technology that allows computers to comprehend and respond to human speech, while analyzing some of its detrimental drawbacks.

Why is HIPAA Compliance a Top Priority for Healthcare Administrators?

HIPAA is a legal healthcare privacy standard passed into law by the Clinton administration. The law standardized how private healthcare information had to be protected and stored by hospitals. In its earliest years of inception, these rules were straightforward. Things have changed considerably. With the digitalization of healthcare records, it’s now easier than ever for patients and hospitals to access records, but it’s also easier for bad actors.

Kubernetes Security Best Practices

Kubernetes is an open source orchestration platform for containerized workflows. It is the best way to manage – or orchestrate – large clusters of containers at scale. Sometimes abbreviated as K8s, Kubernetes helps you efficiently manage clusters of hosts running Linux containers. In the age of containers, Kubernetes has become a popular open source project and key building block for modern tech infrastructure.

Top 11 Vulnerability Assessment Companies You Need To Know

The process of detecting, analyzing, and prioritizing vulnerabilities found through vulnerability assessments is an essential part of maintaining cyber security. Cyber security assessment services that provide vulnerability assessments are highly sought after with the increasing number of threats in the cyber world.

India Implements AML Standards on Crypto Exchanges, Focusing on Transaction Accountability

India has recently implemented Anti-Money Laundering (AML) standards on cryptocurrency and crypto exchange platforms, specifically focusing on transaction accountability. This move comes as India aims to regulate and monitor the rapidly growing cryptocurrency and crypto exchange industry, which has been a topic of controversy due to its association with illegal activities such as money laundering and terrorism financing.

What Is Cyber Forensics?

Cyber forensics refers to the practice of extracting information, analyzing the data and gaining intelligence into activities that involve the use of technology as a structured chain of evidence that can be presented in the court of law. In this article, I’ll look at the basics of cyber forensics: what it’s for, phases in a forensic procedure, challenges and how it goes far beyond auditing.

Office365 Security Audit: Automate, Remediate, Repeat

Over the last two decades, the M365 service capabilities have developed rapidly and have evolved into a more complex version. In addition, the Security & Compliance Centre has rapidly expanded in response to the rising sophisticated attacks. Office 365 user numbers have reached approximately a whopping 345 million," broadly aligning with the 17% y-o-y increase in commercial revenue.

Critical RCE Vulnerability in FortiOS & FortiProxy (CVE-2023-25610)

On Tuesday, March 7, 2023, Fortinet published a security advisory detailing an unauthenticated remote code execution vulnerability affecting FortiOS and FortiProxy (CVE-2023-25610). The vulnerability was internally discovered by Fortinet, and exploitation has not been observed in the wild at this time. A proof of concept (PoC) exploit has not been published publicly for this vulnerability at this time.