Cybersecurity Industry Trends: Hits and Misses From Our 2025 Predictions
Happy New Year! It’s been a pleasure to revisit our predictions from Unsecurity Episode 231, when Evan and Oscar joined…
Happy New Year! It’s been a pleasure to revisit our predictions from Unsecurity Episode 231, when Evan and Oscar joined…
Regulatory bodies somewhat intentionally turn like a large ship. However, despite them remaining relatively steadfast in their objectives of protecting…
It’s finally here! On October 15, 2024, the U.S. Department of Defense (DoD) published the final rule for the Cybersecurity…
What is SEC Regulation S-P and What Does it Mean for Your Cybersecurity Team? First introduced in 2000, SEC Regulation…
Due to a lack of a common language in the security world, it’s easy to get confused and overwhelmed. Considering…
The United States Department of Defense (DOD) has upped its security game in a big way starting in 2020. The…
If you’re a contractor for the DOD, the CMMC needs to be on your radar. Security requirements will be built…
Bank robbers still exist, they’ve just evolved. Instead of putting on a ski mask and grabbing money from the teller,…
If your healthcare practice is transmitting data in a way that doesn’t comply with HIPAA regulations, you’re facing more than…
Information security is a living, breathing process that’s ongoing, it’s a life cycle. Without a life-cycle approach to information security…
On October 14th, Medicare published the final rule on the implementation of MACRA (the Medicare Access and CHIP Reauthorization Act)…
Introduction One of the most significant drivers for information in the healthcare sector (or vertical) is regulatory pressure from the…