Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Navigating HIPAA Compliance When Using Tracking Technologies on Websites

Websites have become indispensable tools for healthcare organizations to connect with patients, streamline operations, and enhance service delivery. Modern websites are composed of components that “build” unique user experiences in real time.However, the use of tracking technologies on these websites presents unique challenges in complying with the Health Insurance Portability and Accountability Act of 1996 (HIPAA).
Featured Post

The Key Steps to Ensuring DORA Compliance

As we approach 2025, financial institutions across the EU face the challenge of complying with the Digital Operational Resilience Act (DORA), which is set to take effect on the 17th of January. DORA is focused on strengthening cybersecurity and operational resilience across financial ecosystems, with the consequences for non-compliance ranging from regulatory fines to reputational damage and an increased risk of cyberattacks.

Unauthenticated Webpages: Hidden HIPAA Risks on Public-Facing Websites

When we think about HIPAA compliance and websites, the focus often shifts to patient portals, online scheduling systems, and other secure areas requiring user authentication. However, it’s crucial to recognize that even unauthenticated webpages, those accessible to the public without logging in, can present hidden HIPAA risks. Let’s explore these often-overlooked vulnerabilities and discuss how covered entities can mitigate potential compliance pitfalls.

Vanta deepens HITRUST partnership with MyCSF integration

As the security expectations of customers grow and the regulatory landscape gets more complex, businesses are recognizing the value of investing in and demonstrating security. As the demand for proving compliance grows, so does the demand for HITRUST, given its reputable assessment process. ‍ Achieving HITRUST certification involves demonstrating compliance with a detailed set of controls designed to manage and mitigate information security risks.

ISO 27001 Lead Implementer vs Auditor: What's the Difference?

In the process of securing a business and achieving a full certification with ISO 27001, there are many different tasks that need to be accomplished, and many different people who need to be working towards achieving those tasks. In fact, a key part of a successful certification and a passing audit is accountability. Different people will need to take on different roles and responsibilities, some of which are for the purposes of the audit, and others for ongoing security.

Protect and Prosper: Turning Cybersecurity Tools into Revenue-Generating Assets

As threats increase, ranging from data breaches to ransomware attacks, the stakes for organisations to protect their digital assets are higher. However, despite its critical role in protecting organisations from threats, cybersecurity is frequently viewed as an operational cost-a defensive measure to ensure systems run safely but one that does not directly contribute to generating revenue or driving financial growth.

Why security questionnaires are a familiar-but ineffective-norm for assessing risk

‍Security questionnaires are a standard part of almost every due diligence process before companies sign on to work with a new third party. ‍ By asking detailed questions via questionnaires, organizations learn about a seller’s security controls and compliance with relevant standards. With that information, they determine how and if a partnership with that third party will expand their attack surface and increase risk—and ultimately decide if the increased risk is acceptable.

How AppSentinels Addresses UAE API First Guidelines for Robust API Management and Security

The UAE Government API First Guidelines are a comprehensive framework designed to standardize API development and management across government entities, promoting innovation, interoperability, and secure data exchange. These guidelines emphasize an API-first approach to digital transformation, focusing on principles like consumer-centric design, robust security measures, lifecycle management, and seamless integration.

Essential Cloud Security Tactics for Securing Complex Environments

In the rapidly expanding world of cloud computing, organizations are increasingly adopting multi-cloud and hybrid cloud strategies to leverage the benefits of flexibility, scalability, and cost-efficiency. However, these complex environments also introduce unique security challenges that must be addressed to protect sensitive data and maintain business continuity. This article explores the essential cloud security tactics that businesses can employ to secure their complex cloud environments effectively.