All cybersecurity strategies are based on considerations of the acts of sophisticated and highly motivated threat actors like ransomware groups or nation/state-sponsored actors, as they should be. InfoSec teams today rely on highly skilled Red Team professionals to...
Before we get onto the note of caution, for those currently observing Seasonal Holidays around the world, we’d like to wish you all a joyful and safe time with your loved ones. For many of us, it’s the time to exchange gifts, many of them being tech gifts that are...
The Solarwinds attack of 2020 thrust software supply chain attack techniques once again into the limelight. Threat actors quickly pivoted to leveraging Open Source Software to perpetuate numerous software supply chain compromises. While not a novel means of...
Maryville University Tables of Contents Issues faced in healthcare cybersecurity #1: Patient privacy protection #2: Vulnerabilities of legacy systems in healthcare #3: Challenges of IT in healthcare #4: Security breaches in healthcare Modernizing healthcare to reduce...
Multi-factor authentication (MFA) is an essential mechanism to defend against unauthorized access authentication attempts. Over the years, a number of algorithms and protocols have been developed to promote secure authentication factors. However, not all factors are...
Data has become the newest and most valuable currency of the digital age. Increasing amounts of data are being processed and exchanged to aid customizations, targeted advertisement, user profiling and tracking, and myriad other purposes. While regulatory entities are...