Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Moving Your Healthcare Organization to the Cloud? Here's What You Need to Know First

While the last two years accelerated digital transformation across a wide range of industries, this has been a long time coming for healthcare. Healthcare has been undergoing a massive shift to improve security, streamline operations, and enhance the patient experience—and much of that shift centers around the movement to the cloud. Cloud-native ostensibly offers a better, more accessible user experience marked by enhanced uptime, reliability, and efficiency.

Introducing INETCO BullzAI Cybersecurity for Enterprise

The Russian invasion of Ukraine has triggered an escalation in the number of state-sponsored actors targeting critical infrastructure with DDoS attacks. Criminal syndicates and smaller players are also exploiting the crisis. From fake fundraising efforts for Ukraine to account takeovers and high-velocity bot-driven attacks such as DDoS, BIN attacks, and terminal attacks, cybercriminals are stepping up their own attacks in an effort to benefit from the turmoil.

CrowdStrike and Cloud Security Alliance Collaborate to Enable Pervasive Zero Trust

The security problems that plague organizations today actually haven’t changed much in 30 years. Weak and shared passwords, misconfigurations and vulnerabilities are problems that have tormented the industry for years and persist to this day. What’s changed is the speed and sophistication at which today’s adversary can weaponize these weaknesses.

Real-Time Threat Detection in the Cloud

Organizations have moved business-critical apps to the cloud and attackers have followed. 2020 was a tipping point; the first year where we saw more cloud asset breaches and incidents than on-premises ones. We know bad actors are out there; if you’re operating in the cloud, how are you detecting threats? Cloud is different. Services are no longer confined in a single place with one way in or one way out.

What is Malware & How to Protect Ourselves From Computer Viruses

Do you remember when viruses used to be funny and not such a big deal? Maybe a cat would constantly pop up on your desktop or you’d get spammed with hundreds of ads for male enhancement pills? Well, the early 2000s are over (yes, it’s depressing) and malware has advanced far beyond its somewhat quirky origins. Today, viruses have become extremely sophisticated and it’s difficult to know for sure if your files have been infected or not. So what is malware exactly?

Securing AWS API access with Netskope Inline Cloud Protection

Watch this demo, presented by Yuri Duchovny, Netskope Principal Global Solutions Architect. Netskope Intelligent Security Service Edge (SSE) is fast, easy to use, and secures your transactions wherever your people and data go. Be ready for anything on your SASE journey with Netskope’s SSE solution. SSE is the convergence of security capabilities into a single cloud-centric platform.

2021 Prediction: Mobile will enable ransomware

As many of us continue to stay at home, we are using our phones, tablets and Chromebooks more – both for personal and work purposes. With their small screens and multitude of messaging channels, they are a perfect vector for phishing messages aimed at stealing credentials for corporate access. Hear from Kristna Balaam, Senior Security Intelligence Researcher about what we got right, and what surprised us. See our 2022 predictions on our newest blog: bit.ly/3pS3rfb

Security Service Edge (SSE) Is the Way To Go, but How Do You Choose?

Gartner® recently predicted that “By 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services and private application access from a single vendor’s security service edge (SSE) platform."* If you don't know what SSE is, you should read my colleague Sundaram Lakshaman’s breakdown of SSE and Secure Access Service Edge (SASE). The gist of it is that SSE is the convergence of security technologies inside the SASE framework.

New Supply Chain Vulnerabilities Impact Medical and IoT Devices

Forescout’s Vedere Labs, in partnership with CyberMDX, have discovered a set of seven new vulnerabilities affecting PTC’s Axeda agent, which we are collectively calling Access:7. Three of the vulnerabilities were rated critical by CISA, as they could enable hackers to remotely execute malicious code and take full control of devices, access sensitive data or alter configurations in impacted devices.