What is PHI? (Protected Health Information)
Protected Health Information (PHI) is a critical aspect of healthcare, encompassing any data that can identify an individual and is […]
What is PHI? (Protected Health Information) Read Post »
Protected Health Information (PHI) is a critical aspect of healthcare, encompassing any data that can identify an individual and is […]
What is PHI? (Protected Health Information) Read Post »
A previously undocumented threat activity cluster dubbed Earth Minotaur is leveraging the MOONSHINE exploit kit and an unreported Android-cum-Windows backdoor
Hackers Target Uyghurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor Read Post »
Key questions remain unresolved concerning the use of Gen AI tools, while one country may need stronger deterrence against data
How laws strain to keep pace with AI advances and data theft Read Post »
FBI and Cybersecurity and Infrastructure Security Agency (CISA) officials have advised Americans to use encrypted call and messaging apps to
8+ US telcos compromised, FBI advises Americans to use encrypted communications Read Post »
Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself,
Want to Grow Vulnerability Management into Exposure Management? Start Here! Read Post »
SurePath AI launched SurePath AI Discover, a new offering that provides visibility into a company’s employee use of public AI
SurePath AI Discover classifies AI use by intent and detects sensitive data violations Read Post »
NHIs pose a unique set of challenges and risks because they often have privileged access and lack the added security
How to Tackle the Unique Challenges Posed by Non-Human Identities Read Post »
A suspected Chinese threat actor targeted a large U.S. organization earlier this year as part of a four-month-long intrusion. According
Researchers Uncover 4-Month Cyberattack on U.S. Firm Linked to Chinese Hackers Read Post »
Identity phishing doesn’t just lead to data theft – it can also lead to financial fraud, targeted social engineering attacks
Identity Phishing: Using Legitimate Cloud Services to Steal User Access Read Post »
Even the brightest minds benefit from guidance on the journey to success. The Ultimate Guide to the CCSP covers everything
The Ultimate Guide to the CCSP Read Post »