Written by: Prajakta Jagdale | Director, Offensive Security | Palo Alto Networks This will be the first of many posts covering topics across data analysis, data science, data visualization, and machine learning as they pertain to cybersecurity. While it likely will...
All cybersecurity strategies are based on considerations of the acts of sophisticated and highly motivated threat actors like ransomware groups or nation/state-sponsored actors, as they should be. InfoSec teams today rely on highly skilled Red Team professionals to...
Before we get onto the note of caution, for those currently observing Seasonal Holidays around the world, we’d like to wish you all a joyful and safe time with your loved ones. For many of us, it’s the time to exchange gifts, many of them being tech gifts that are...
The Solarwinds attack of 2020 thrust software supply chain attack techniques once again into the limelight. Threat actors quickly pivoted to leveraging Open Source Software to perpetuate numerous software supply chain compromises. While not a novel means of...
Maryville University Tables of Contents Issues faced in healthcare cybersecurity #1: Patient privacy protection #2: Vulnerabilities of legacy systems in healthcare #3: Challenges of IT in healthcare #4: Security breaches in healthcare Modernizing healthcare to reduce...
Multi-factor authentication (MFA) is an essential mechanism to defend against unauthorized access authentication attempts. Over the years, a number of algorithms and protocols have been developed to promote secure authentication factors. However, not all factors are...