Data breaches are becoming more costly across all industries, with healthcare in the lead. The 2023 Cost of a Data Breach Report analyzes data collected from March 2022 to March 2023. Healthcare remains a top target for online criminal groups. These data breach costs are the highest of any industry…
Read More
Threat hunting involves looking for threats and adversaries in an organization’s digital infrastructure that existing security tools don’t detect. It is proactively looking for threats in the environment by assuming that the adversary is in the process of compromising the environment or has compromised the environment. Threat hunters can have…
Read More
Ransomware and data leaks are inconvenient and costly. But what about a cyber incident that leads to mass casualties? The notion of “black swan” events — incidents that are so rare and unusual they cannot be predicted — is a “fallacy”, according to Sarah Armstrong-Smith, Chief Security Advisor at Microsoft,…
Read More
Vulnerability management is a security practice designed to avoid events that could potentially harm an organization. It is a regular ongoing process that identifies, assesses, and manages vulnerabilities across all the components of an IT ecosystem. Cybersecurity is one of the major priorities many organizations struggle to stay on top…
Read More