EHR’s Leaky “Last Mile” of Third-Party Apps Exposes Patient Data. Approov Sends FHIR Guard to the Rescue. New findings from Approov and cybersecurity researcher Alissa Knight with Knight Media expose “Last Mile” electronic health record (EHR) security issues in healthcare apps that leave millions of patient healthcare records exposed. The […]

Finding, Fighting FHIR App Vulns

A recent GroupSolver study reveals concern among digital consumers about their personal information being collected and sold, and nearly half are willing to pay platforms to keep their data private.  Rasto Ivanic, Co-founder and CEO of GroupSolver® Every day, users’ online interactions are monitored and stored by technology companies to […]

Selling Privacy Protection Could Be a Win-Win for Big Tech ...

By Julian Lovelock, Vice President, Global Business Segment Identity and Access Management Solutions, HID Global Even before the pandemic changed so much of daily life in so many ways, there was a transformation in workplaces. Physical boundaries were no longer the only perimeter defining secure workplace access. Identity became a […]

Protecting a New Perimeter

By Jeff Broth Distributed denial of service (DDoS) is emerging as a significant concern in internet security now. DDoS is an offshoot of denial of service (DoS) cyber threats that started 20 years ago. “Distributed” in the context of the DDoS attack means that a hacker or group of hackers […]

Distributed Denial of Service: Essential Things to Know

By Rashed Abdel-Tawab, Lead Product Manager, CIS Mobile When Apple recently announced several new features aimed at curbing the distribution of child sexual abuse material (CSAM), the backlash was predictable. Security experts and privacy advocates alike immediately criticized the technology, which enables Apple to scan photos stored in iCloud for […]

Smartphones Putting Government Users at Risk

By John Callahan, Chief Technology Officer, Veridium The 2020 pandemic and resulting work-from-home experience yielded an important conclusion regarding cybersecurity: identity is the new perimeter. Sixty-three percent of all data breaches exploit weak credentials, and incidents like SolarWinds highlight the need to focus cybersecurity on identity and access management (IAM) […]

One Size Doesn’t Fit All – Auth Journeys to Digital ...

By Theo Zafirakos, CISO Terranova Security It’s fair to say cloud technology has become ubiquitous in recent years, with the global cloud storage market projected to grow from USD 50.1 billion in 2020 to USD 137.3 billion by 2025. As a result, many laptops have minimal onboard storage because of the ease and […]

Is Your Cloud Storage Secure?

In Episode S3E11 our guest is Dr. Bill Anderson, President of CIS Mobile. Dr. Anderson is a security industry executive with extensive leadership experience founding, funding, and operating security software companies. He has previously served as Vice President, Technology Investments at Allied Minds where he managed a portfolio of information […]

Smartphone-related Security Threats

By Reef Pearson, SecureTeam Headlines throughout the pandemic have been fixated on panic-evoking cyberattack figures, the security ‘ignorances’ of staff working from home, and the critical shortage of jobs in the Cybersecurity industry. Yet despite every cyber disaster being the result of a failed prevention, there hasn’t been any noise […]

Is the COVID-19 Cybersecurity Crisis a Perfect Example of How ...

By Amanda Lieu, Product Marketing Manager, SEON The internet could never be just one thing. Does it allow for previously unheard-of levels of privacy, allowing anyone from political dissidents to criminals to organize anonymously? Of course. Does it also record everything we are doing, a true panopticon that is watching […]

The reality of online fraud means balancing privacy and security

Established in 2001, EC-Council develops and provides proprietary cybersecurity training and certification programs for customers in more than 145 countries worldwide, both directly and through more than 700 partners. The company has experienced substantial growth driven by a rising need to protect corporations against increasingly complex cyber threats in recent years. Today […]

EQT Private Equity adds to its cybersecurity investments with a ...