Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Real-Time Health Insights Empower Better Chronic Care

Managing chronic conditions can feel overwhelming, with patients juggling medications, tracking symptoms, and hoping they're on the right path. Fortunately, healthcare is evolving with technology that makes managing long-term health simpler and more proactive. The Center for Medicare & Medicaid Innovation reports that Chronic Care Management (CCM) programs cut costs by $74 per patient monthly, highlighting not just savings but improved care.

Best Practices for Securing Operational Technology

Operational technology (OT) underpins everyday life by providing the networks and systems required to deliver and maintain key services. These critical infrastructures are increasingly targeted by threat actors, causing public disruption and reputational and financial damage. OT security plays a vital role in redressing this threat, but it must be implemented strategically to be effective.

Developers fly the plane: AI guardrails for secure cloud innovation

Developers now chart courses through environments as dynamic and unpredictable as open skies, plotting efficient courses through shifting clouds of technology to reach ambitious goals. Increasingly, AI assistants are copilots on these journeys—streamlining workflows, reducing repetitive tasks, and enabling teams to navigate more complex terrain with speed.

Safe, High-Velocity Library Upgrades in Tomcat Monoliths

Keeping a large production system healthy often feels like changing airplane engines while in flight. At Egnyte, we still operate several sizeable Java monoliths that run inside Apache Tomcat. All high-severity Common Vulnerabilities and Exposures (CVEs) need to be patched quickly—sometimes in a matter of days—to maintain the uncompromising security posture our customers expect.

KAWA4096's Ransomware Tide: Rising Threat With Borrowed Styles

KAWA4096, a ransomware whose name includes "Kawa", the Japanese word for "river", first emerged in June 2025. This new threat features a leak site that follows the style of the Akira ransomware group, and a ransom note format similar to Qilin’s, likely an attempt to further enrich their visibility and credibility. In this blog post, we’ll share key insights from an analyzed KAWA4096 sample to uncover how this ransomware operates and what sets it apart.

Demo: Tanium integration with Microsoft Sentinel

Discover how Tanium’s powerful integration with Microsoft Sentinel transforms your security operations. In this demo, we walk through real-world scenarios showing how your team can streamline investigations, accelerate response times, and centralize threat intelligence—all within the Sentinel console. What You’ll Learn: Key Benefits.

Can Your Hospital Keep Running During a Cyberattack?

A cyber breach shouldn't bring critical patient care to a halt. That’s the idea behind the Minimum Viable Hospital, a model that ensures essential functions continue even under attack. Errol Weiss shares how leading healthcare systems are planning for resilience, and why smaller hospitals may struggle to keep up. He highlights how the standard response to healthcare cyberattacks overlooks the complex reality of delivering medical care. It’s time to recognize that cybersecurity isn’t just about systems, it’s about people.

Unlock Email Threat Visibility with Mimecast and Graylog

Email threats aren’t slowing down. From credential phishing to malware-laced attachments, email remains one of the most exploited entry points for attackers. If you’re already using Mimecast to help mitigate that risk, you’re ahead of the curve — but raw log data only gets you so far. Starting with Graylog 6.2.3, you can pull logs directly from Mimecast using API v2.0 and view them immediately with built-in Illuminate Dashboards.