The Rosen-Cassidy bill is a heroic effort, but it needs money from the Infrastructure Act to support the Herculean efforts it will take to make us safe.
Log 4j exposes both business associates and patients. The time is here for everyone to build or contract a team of experts.
Agio Shield leverages AI to detect new cyber threats before they reach your people.
Cybersecurity in healthcare had a big year, pointing out the importance of adhering to Agio's "Brilliance in the Basics."
With the right policies and processes in place, you can significantly minimize your organization’s likelihood of falling victim to ransomware.
Ten ways to maximize privilege for cybersecurity forensic reports to keep your reports protected.
An inside look at what happened with SolarWinds and how to protect yourself when the unexpected comes calling.
A brief overview of U.S. privacy laws that give protections to individuals regarding the collection, use, and disclosure of personal information by both the public and private sectors.
How a bad actor group affected the legal implications of cracking hashed passwords, and what SHA-256 is.
On January 5, 2021, the HR 7898 - HIPAA Safe Harbor Bill, was signed into law, which amends the Health Information Technology for Economic and Clinical Health (HITECH) Act.
On November 17, 2020, the Securities and Exchange Commission (SEC) voted to allow e-signatures, subject to certain prerequisites, on documents filed with the SEC via the Electronic Data Gathering, Analysis, and Retrieval system.
Tips and recommendations to inform your defense against this most troubling form of malware.
Training end users to be vigilant against cyber-attacks is the first step towards keeping your organization secure.
This post highlights some of the common technology that bad actors may use against systems to orchestrate attacks.
Last year’s notorious malware masterminds are at it again.