Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

HHS Proposes Critical HIPAA Security Rule Updates to Combat Rising Cybersecurity Threats in Healthcare

The Health and Human Services Office of Civil Rights (OCR) has launched an effort to improve cybersecurity measures for a wide variety of healthcare organizations. The aim is to counter the significant increase in the number of breaches and cyberattacks impacting healthcare along with the common deficiencies OCR has observed in its investigations into Security Rule compliance, cybersecurity guidelines, best practices, methodologies, procedures, and processes.

Why Patching Isn't the Ultimate Goal in Cybersecurity

A recent analysis by JPMorganChase criticized the CVSS scoring process, finding missing context leads to misleading prioritization. When it comes to cybersecurity, patching vulnerabilities often feels like the Holy Grail. Get those CVEs patched, and you’re safe, right? Well, not exactly. As we know, patching isn’t as straightforward—or as effective—as we’d like to believe.

5 trust trends shaping security strategies in 2025

Trust is critical to the success of every business. And in 2024, we saw that building, scaling, and demonstrating trust is getting more difficult for organizations. ‍ Vanta’s second annual State of Trust Report uncovered key trends across security, compliance, and the future of trust. Based on a survey of 2,500 IT and business leaders in the U.S., UK, and Australia, our research found that more than half (55%) of organizations say that security risks for their business have never been higher.

Sysdig is recognized as a Customers' Choice in Gartner Voice of the Customer for Cloud-Native Application Protection Platforms

As the adoption of cloud-native technologies like containers, Kubernetes, and microservices have evolved, traditional security solutions have struggled to keep up. According to the Sysdig Threat Research Team (TRT), the average time it takes an attacker to perform reconnaissance and complete an attack is just 10 minutes. To help teams outpace attackers, cloud-native application protection platforms have emerged.

8 Privileged Access Management (PAM) Best Practices for Cloud Infrastructure

Even the simplest mistakes can leave your data wide open to cyber threats. If the worst happens and there’s an attack, cybercriminals gain free-for-all access to your cloud resources. They tamper with your data, disrupt workflows, and steal sensitive information, meaning the need for Privileged Access Management (PAM) best practices are more indispensable than ever for any robust cloud security strategy.

How To Achieve Zero-Standing Privilege in Your Organization

Your organization can achieve zero-standing privilege by following best practices such as enforcing least privilege access, implementing Just-in-Time (JIT) access and continuously monitoring and auditing privileged access. Following these best practices ensures that privileged access is granted only when necessary, and for the shortest duration possible, significantly reducing your organization’s attack surface and enhancing overall security.

Securing Patient Privacy: Techniques for De-identifying Healthcare Data

Protecting patient privacy is vital in the healthcare industry. The rise of digital records has made safeguarding sensitive information more challenging. De-identifying healthcare data ensures compliance with regulations like HIPAA while protecting patient information. Key concepts include PHI (Protected Health Information), de-identification, and the safe harbor method.

Operational Resilience Deadlines Are Coming Soon

With increasing cyber threats, data breaches, and the rapid pace of digital transformation, operational resilience has become a top priority for financial institutions. As we begin 2025, this is especially true in the UK, because of new regulations going into effect. Regulatory bodies like the Financial Conduct Authority (FCA), Prudential Regulation Authority (PRA), and the Bank of England have introduced stringent rules to safeguard the stability and resilience of the financial services sector.

Smarter ticket handling with AI and the new wave of orchestration

In this guest post, Connor Brewer, Principal Solutions Architect at Uzado - a Canadian-based IT and security service provider - showcases an innovative IT help desk app built with AI in Tines, which boasts countless other potential applications. For many IT and security teams, outdated orchestration and automation solutions create more challenges than solutions.

Beyond SIEM: Transform Into a Data-Driven Organization With Devo

The Devo Platform has earned its reputation as a powerful and innovative force in Security Information and Event Management (SIEM). Customers rely on Devo to detect and respond to threats in real time, gain complete visibility into their security posture, and streamline their security operations. But the core strengths that make Devo a SIEM leader – unmatched scalability, real-time analytics, and flexible customization – also enable us to solve a variety of other data challenges.