Blog

Read More
Healthcare Cybersecurity Threats: August 2023

Healthcare Cybersecurity Threats: August 2023

Vulnerabilities from two very different IT manufacturers and device types were notable threats in August. They serve as a reminder …

Learn More
Blog Healthcare Cybersecurity Threats
Read More
Stretching your Cybersecurity Budget: 6 Ways to Do More With Less 

Stretching your Cybersecurity Budget: 6 Ways to Do More With Less 

In today’s healthcare landscape, “doing more with less” isn’t just a slogan – it’s a growing request, especially within IT …

Learn More
Blog Cybersecurity Budget
Read More
Black Hat 2023: Reflections from a First-Timer 

Black Hat 2023: Reflections from a First-Timer 

Now that the dust has settled and the hype surrounding Black Hat 2023 has subsided, I wanted to take a …

Learn More
Blog Cybersecurity Conferences
Read More
Living Off the Land Attacks: Unveiling the Illusion 

Living Off the Land Attacks: Unveiling the Illusion 

When a threat actor performs a “Living Off the Land” (LOTL) attack, they use legitimate tools and processes within a …

Learn More
Blog Cyber Attacks Types
Read More
The Evolution and Impact of NIST CSF 2.0

The Evolution and Impact of NIST CSF 2.0

NIST, or the U.S. National Institute of Standards and Technology, is at the forefront of the evolving realm of cybersecurity. …

Learn More
Blog Regulation & Compliance
Read More
Healthcare Cybersecurity Threats: July 2023

Healthcare Cybersecurity Threats: July 2023

In July, cybercriminals increasingly targeted Linux systems and exploited new zero-day vulnerabilities in Citrix solutions. While threat actors never cease …

Learn More
Blog Healthcare Cybersecurity Threats
Read More
Behind the Scenes of a Hospital Ransomware Attack 

Behind the Scenes of a Hospital Ransomware Attack 

In television dramas and Hollywood movies, ransomware attacks are often made known by a flashy message that pops up on …

Learn More
Blog Cyber Attacks Types
Read More
Healthcare Cybersecurity Threats: June 2023

Healthcare Cybersecurity Threats: June 2023

During the summer months, threat actors often escalate their activities, taking advantage of staffing shortages among IT teams, and leaving …

Learn More
Blog Healthcare Cybersecurity Threats
Read More
How Health Systems Can Reduce their Attack Surface with VTM

How Health Systems Can Reduce their Attack Surface with VTM

What is attack surface management? Think of your attack surface as a fortress with multiple entry points. Each entry point …

Learn More
Blog Vulnerability Threat Management
Read More
Single Sign-On vs Multi-Factor Authentication: Do you Know the Difference?

Single Sign-On vs Multi-Factor Authentication: Do you Know the Difference?

A disheartening reality is that cyberattacks targeting healthcare and other critical industries are on the rise, making it more important …

Learn More
Blog Cybersecurity Fundamentals