Reading view

There are new articles available, click to refresh the page.

Identify Your Cybersecurity Risk Using a Risk-Based Approach

The National Institute of Standards and Technology (NIST) has laid out the Cybersecurity Framework as a set of guidelines that offers outcomes that organizations can use in their cybersecurity efforts. The NIST categories include identify, protect, detect, respond, and recover. Pondurance, a managed detection and response services provider with a 24/7 security operations center, aligns its service lines with...

The post Identify Your Cybersecurity Risk Using a Risk-Based Approach appeared first on Pondurance.

The post Identify Your Cybersecurity Risk Using a Risk-Based Approach appeared first on Security Boulevard.

Ascension Cyber Attack Leaves Healthcare Sector Reeling

On May 9, Ascension, the largest nonprofit and Catholic health system in the United States, announced that it fell victim to a major cyber attack. This occurs in the wake of the recent massive Change Healthcare cyber incident. But the attack on Ascension is different since it directly impacts clinical operations across multiple facilities.  After...

The post Ascension Cyber Attack Leaves Healthcare Sector Reeling appeared first on Hyperproof.

The post Ascension Cyber Attack Leaves Healthcare Sector Reeling appeared first on Security Boulevard.

Security Compliance 101: What It Is and How to Master It

Talk to any compliance officer today, and they will all agree that modern security compliance — fulfilling your organization’s regulatory obligations to keep data safe, secure, and intact — must be a top priority for every business. But what, exactly, does that mean? How can compliance officers determine their security compliance risks and the appropriate...

The post Security Compliance 101: What It Is and How to Master It appeared first on Hyperproof.

The post Security Compliance 101: What It Is and How to Master It appeared first on Security Boulevard.

SOC 2 Compliance: What You Need to Know and Need to Do

Businesses today are storing increasing amounts of data on customers, and it’s not just users who are concerned about the safety of their data. One of the compliance standards that has emerged in an effort to ensure data protection is Service Organization Control 2, or SOC 2 reports. While SOC 2 standards aren’t part of...

The post SOC 2 Compliance: What You Need to Know and Need to Do appeared first on Hyperproof.

The post SOC 2 Compliance: What You Need to Know and Need to Do appeared first on Security Boulevard.

Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for April 2024

Every month, the Pondurance team hosts a webinar to keep clients current on the state of cybersecurity. In April, the team discussed threat intelligence, vulnerabilities and trends, security operations center (SOC) engineering insights, threat hunting, and detection engineering. Threat Intelligence The Senior Manager of Digital Forensics and Incident Response (DFIR) discussed the recent surge of...

The post Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for April 2024 appeared first on Pondurance.

The post Novel Threat Tactics, Notable Vulnerabilities, and Current Trends for April 2024 appeared first on Security Boulevard.

How to Adapt to Executive Order 14028

In May 2021, the White House released the Executive Order on Improving the Nation’s Cybersecurity, also known as EO 14028. The document is fairly dense, but its contents are of the utmost concern for federal agencies, critical infrastructure, and government contractors (especially cloud service providers and software developers).  The order is meant to improve the...

The post How to Adapt to Executive Order 14028 appeared first on Hyperproof.

The post How to Adapt to Executive Order 14028 appeared first on Security Boulevard.

Spring into Action: A Corporate Digital Spring Cleaning Plan

James Keiser, Director of Secured Managed Services (SMS) at CISO Global  Spring cleaning is no longer just about spotless windows and gleaming floors. In the digital age, businesses need to consider the clutter accumulating in their virtual filing cabinets too. A corporate digital spring cleaning can breathe new life into your organization’s online presence and […]

The post Spring into Action: A Corporate Digital Spring Cleaning Plan appeared first on CISO Global.

The post Spring into Action: A Corporate Digital Spring Cleaning Plan appeared first on Security Boulevard.

Understanding CUI: What It Is and Guidelines for Its Management

It sounds official — like it might be the subject of the next action-packed, government espionage, Jason Bourne-style thriller. Or maybe put it before the name of a racy city and have your next hit crime series. A history of mysterious aliases like “official use only,” “law enforcement sensitive,” and “sensitive but unclassified” only adds...

The post Understanding CUI: What It Is and Guidelines for Its Management appeared first on Hyperproof.

The post Understanding CUI: What It Is and Guidelines for Its Management appeared first on Security Boulevard.

Build Strong Information Security Policy: Template & Examples

Every organization needs to have security measures and policies in place to safeguard its data. One of the best and most important measures you can take to protect your data (and that of your customers) is simply to have a robust information security policy. Of course, that idea sounds simple enough. In practice, however, it’s...

The post Build Strong Information Security Policy: Template & Examples appeared first on Hyperproof.

The post Build Strong Information Security Policy: Template & Examples appeared first on Security Boulevard.

Pondurance Announces Partnership With E&I Cooperative Services

The vast majority of cyberattacks are executed for financial gain, and that means that any organization, regardless of size, industry, or current in-house capabilities, can become a victim of cybercrime. Educational organizations are a particularly attractive target for cybercriminals, especially from phishing and ransomware attacks, due to their valuable personal data on students and lack...

The post Pondurance Announces Partnership With E&I Cooperative Services appeared first on Pondurance.

The post Pondurance Announces Partnership With E&I Cooperative Services appeared first on Security Boulevard.

❌