Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Texas Medical Center Leaks Patient Information Following Data Breach

In South Texas, United Medical Centers (UMC) offer reliable, high-quality healthcare services. They host nine locations in the region, servicing patients from the surrounding communities; their services include options for family planning, WIC, and a broad selection of care to assist chronic illnesses. The clinics provide care to more than 34,184 patients in the area, where many use public insurance to receive services.

Network Monitor, LiveAction, Announces Ransomware Incident

LiveAction Incorporated is a software company specializing in analytics, network monitoring, and application management tools. They’ve reported a revenue of over $5 million and provide services to companies in various industries; technical manufacturers, hospitals, biotechnology, and transportation professionals all use LiveAction services. Earlier this year, LiveAction suffered a ransomware attack where hackers took significant consumer information.

National Behavioral Health Clinic Suffers Ransomware

Deer Oaks Behavioral Health is a national provider of mental health based in San Antonio, Texas. They offer the nation long-term care focused on psychiatry and psychology. Deer Oaks hosts more than 1,500 facilities nationwide. Their services include medication and medical treatment planning while spearheading new techniques for rural tele-behavioral health.

Microsoft's AI Experiment Gone Wrong: The Rise and Fall of 'Emily' - From Innovation to Controversy

In this eye-opening video, we delve into the intriguing story of Microsoft's AI experiment, affectionately known as 'Emily,' and its transformation from an innovative creation to a controversial internet sensation. Just a few years ago, Microsoft introduced 'Emily' to the world, a cutting-edge AI designed to interact with and learn from internet users. However, the results were far from what anyone expected.

Release Fast and Secure or Die!

Repetitive tasks are the antithesis of speed. The only way to deliver software rapidly, securely and with quality is to automate software packages across the software supply chain to drive enhanced testing, improve decision-making, eliminate bottlenecks and holistically manage your software resources. Join Yossi Shaul, SVP of R&D, JFrog, and Gali Zisman, VP of Product, JFrog, to explore JFrog’s new release-first approach, including exclusive swampUP announcements, first-time demonstrations & key product advancements!

Shielding the Foundation: Security Across Your SSC

Developers are now the target of the attacker, with binaries available publicly. While it's unlikely that the concept of security point solutions will completely disappear, it’s clear that the market is demanding a consolidated, comprehensive approach to pipeline security across the attack surface. With the increasing complexity of software supply chains, security and governance are becoming critical on developer’s machines, at the C-level and in boardrooms. In this session, Eyal Dyment, VP of Security Product for JFrog, details how next-gen software supply chain solutions must incorporate robust, holistic security or risk being the next tool to be consolidated.

NYDFS Regulatory Changes: Vulnerability Management and Risk Assessment

The financial sector is constantly adapting to emerging threats and regulatory changes. The New York Department of Financial Services (NYDFS) is at the forefront of cybersecurity regulation, ensuring that covered entities within the state maintain robust cybersecurity programs. In this blog post, we’ll dive into the recent changes to NYDFS regulations, specifically focusing on vulnerability management and an updated definition of risk assessment.

TrustCloud Becomes HITRUST Readiness Licensee, to Make HITRUST Accessible and Affordable for Healthcare Technology Companies

TrustCloud's common control framework, programmatic policy mapping and evidence collection and an evidence-viewing portal make readiness and assessment more efficient for both auditors and companies pursuing HITRUST.