Deep Blue Background

Cybersecurity Blog

Expert insights, guidance, and recommendations for strengthening your healthcare cybersecurity posture.

  • By Category

  • By Date

  • Reset
Read More
Associate Spotlight: Deepthi Padrithi

Associate Spotlight: Deepthi Padrithi

  How long have you been with Fortified and what is your current role? I’m a Senior Threat Analyst at ...
Read More
Blog Associate Spotlight
Read More
Healthcare Cybersecurity Threats: July 2024

Healthcare Cybersecurity Threats: July 2024

In the endless battle to safeguard healthcare organizations against cyber threats, July was certainly no ordinary month. As blue ...
Read More
Blog Healthcare Cybersecurity Threats
Read More
Reflections on Black Hat 2024: A Year of Alliances, AI, and Leadership

Reflections on Black Hat 2024: A Year of Alliances, AI, and ...

While Black Hat 2024 continued to build upon what felt to me like the introduction of “AI first” cybersecurity during ...
Read More
Cybersecurity Conferences Blog
Read More
Third-Party Risk Management: A Guide to More Secure Partnerships

Third-Party Risk Management: A Guide to More Secure ...

The use of third-party vendors has become essential for delivering comprehensive patient care, streamlining operations, and ...
Read More
Blog Third-Party Risk Management
Read More
Associate Spotlight: Troy Cruzen

Associate Spotlight: Troy Cruzen

  How long have you been with Fortified and what is your current role? I’ve been with Fortified for almost ...
Read More
Blog Associate Spotlight
Read More
How to Get C-Suite Buy-In for Healthcare Cybersecurity

How to Get C-Suite Buy-In for Healthcare Cybersecurity

Giving a cybersecurity presentation to the C-suite can be a challenge for even the most experienced Chief Information Security ...
Read More
Blog Cybersecurity Fundamentals
Read More
The Risk and Rewards of Quantum Computing in Healthcare

The Risk and Rewards of Quantum Computing in Healthcare

Healthcare organizations depend on strong cryptographic technologies to secure data. As quantum technologies rapidly advance, ...
Read More
Blog Network Security
Read More
Healthcare Cybersecurity Threats: June 2024

Healthcare Cybersecurity Threats: June 2024

June was a high-stakes game on the cybersecurity chessboard for healthcare organizations. Major technology providers like ...
Read More
Blog Healthcare Cybersecurity Threats
Read More
Associate Spotlight: Hannah Hays

Associate Spotlight: Hannah Hays

  How long have you been with Fortified and what is your current role?   I’ve been with Fortified for 2 ...
Read More
Blog Associate Spotlight