Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Weekly Cybersecurity Recap November 17

Breaches were rampant this week, impacting as many as 15 million individuals. The State of Maine announced that it bled 1.3 million resident records due to the global MOVEit vulnerability. Meanwhile, in Ohio, the City of Huber Heights was targeted by a ransomware attack; potentially, 50,000 residents may have their data exposed. In Michigan, the McLaren Health Care network was allegedly attacked by the ransomware gang BlackCat—losing 2.2 million records to exposure.

Stanford Health Network Announces MOVEit Breach

Stanford Health Care Alliance encompasses children’s hospitals, care plans, medicine partners, scholars, and the Stanford University faculty. The breach allegedly includes information from Stanford Health Care, Stanford Tri-Valley, Stanford Medicine Partners, Lucile Packard Children’s Hospital, and Packard Children’s Health Alliance.

Decoding the Boardroom

In the high-stakes world of cybersecurity, one of the most daunting challenges faced by CISOs is the task of persuading their organization to invest in security capability. But in an age of worker shortages, cost-cutting measures, and a surge in third-party cyber risk at the enterprise level, CISOs need to get this message across urgently.

Revolutionizing Cybersecurity: Global Coalition Unveils Password Guidance!

Get ready to witness a game-changing moment in the world of cybersecurity and passwords! An impressive coalition of over 90 nonprofit organizations, including Consumer Reports and the Better Business Bureau, just dropped a brand-new directive protecting your accounts and devices called “The Common Guidance on Passwords.” This announcement sets the stage for the grand inauguration of “World More Than a Password Day,” which was on November 10, 2023.

DevSecOps Best Practices: Leveraging Veracode DAST Essentials

DevSecOps is a modern approach to software development that implements security as a shared responsibility throughout application development, deployment, and operations. As an extension of DevOps principles, DevSecOps helps your organization integrate security testing throughout the software development life cycle. In this blog, we discuss DevSecOps best practices and practical steps to producing secure software.

Comparing Features in Personal and Business ID Verification Solutions

Identity verification is a foundational aspect of both personal and business transactions in today’s digital age. Whether you’re an individual seeking to access online services or a business aiming to establish trust with your customers, the right identification solution is essential.

How Digital Transformation Impacts Vulnerability Management Programs... and the Solution

Global digital transformation is rapidly changing the way businesses operate. This has led to a significant increase in the attack surface, which organizations must protect. However, this can be a daunting task for organizations that are still using traditional vulnerability management tools and processes. In this article, we will discuss the impact of digital transformation on vulnerability management and explore what a modern and automated vulnerability management solution looks like.

Revolutionizing Work: The Evolution of Technology and its Impact on Jobs and Opportunities #podcast

In this insightful video, we delve into the fascinating journey of technological evolution and its profound impact on the way we work. From the days of pools of typists diligently typing away to the transformative era of computing, witness the incredible shift that has shaped our work landscape.

Nucleus Product Update 3.9

Welcome to the Nucleus Product Update 3.9. As we approach Thanksgiving, we’d like to start by expressing our appreciation for you and the rest of the Nucleus family. Thank you for being a part of our community and contributing to our collective growth and success. We have so much to be thankful for this year, especially YOU! We hope you have a wonderful holiday celebrating all there is to be grateful for and enjoying a great meal with the people you love most.

Mastering Security: Navigating Protective Detective, and Corrective Controls with Compliance Harmony

Dive deep into the world of cybersecurity with our latest video, "Mastering Security: Navigating Protective, Detective, and Corrective Controls with Compliance Harmony." In this insightful exploration, we demystify the roles of protective, detective, and corrective controls, highlighting their crucial functions in maintaining a robust control environment.