Huntington Hospital Former Employee Accesses Private Info of 13,000 Patients

Roughly 13,000 patients at Huntington Hospital have recently been informed about an incident involving illegal access to confidential information. What Happened? The medical facility discovered that a night shift employee…

‘Printjack’ Printer Attacks Pose a Serious Threat, Researchers Warn

A group of Italian cybersecurity researchers has put together a set of three attacks known as ‘Printjack,’ alerting people of the serious risks of trusting their printer too much. According…

UK Introduces New Cybersecurity Legislation for IoT Devices

UK Introduces New Cybersecurity Legislation for IoT Devices The UK government has today introduced new legislation to Parliament that aims to better protect consumers’ IoT devices from hackers. The Product Security…

Apple Sues “State-Sponsored” Spyware Firm NSO Group

Apple Sues “State-Sponsored” Spyware Firm NSO Group Apple has become the latest tech giant to sue Israeli spyware developer NSO Group, in a bid to hold it accountable for targeted…

Application Whitelisting Concepts: Definition, Types, Implementation and Best Practices

The simplest way to stop malicious code from infiltrating your network is by automatically blocking it before it even enters the system. A straightforward and efficient way to achieve that…

OAIC finds big four banks are handling consumer data with good privacy practices

An audit of Australia’s big four banks by the Office of the Australian Information Commissioner (OAIC) has found that they have been handling consumer data under the Consumer Data Right…

What is Endpoint Security?

A significant portion of cyberattacks target endpoints, either individually or as gateways to the larger company network. Unfortunately, this is not a singular threat, but a layered issue: hackers exploit…

3 Top Tools for Defending Against Phishing Attacks

Phishing emails are now skating past traditional defenses. Justin Jett, director of audit and compliance at Plixer, discusses what to do about it. Even with the most sophisticated email scanning…

Cloud security firm Lacework secures $1.3 billion in new funding round

Lacework has raised $1.3 billion in a new funding round to bolster its position in the cloud security market.  Announced on Thursday, the Series D funding round was led by…

2021 Market Guide for Managed Detection and Response Services – A Gartner Report: Thoughts from Bitdefender MDR

Gartner® released its first Market Guide for Managed Detection and Response (MDR) back in 2016. At the time, MDR was still an emerging market, comprised of security monitoring providers with…