Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Johns Hopkins Suffers a Breach Losing Patient, Student, and Faculty Data

Johns Hopkins is one of the leading teaching hospitals that serve approximately 500 medical students annually while caring for tens of thousands of patients. The facility has a total of 1091 beds and serves patients in primary care and trauma care, along with several specialties. The facility is located in Baltimore, Maryland, and because it serves so many students and patients, it stores a huge amount of personal and medical data. Some of that data was just released because of a breach.

Law enforcement's battle against Cryptocurrency crime

While cryptocurrencies have been celebrated for their potential to revolutionize finance, their anonymous nature has also been exploited for illicit activities. From drug dealing and arms trafficking to funding terrorism, black market activities have thrived under the cloak of cryptocurrency's pseudonymity. According to a report by Chainalysis in 2023, around $21 billion in crypto transactions were linked to illegal activities.

Microsoft Office 365 Secure Score Limitations for MSPs

Microsoft 365 Secure Score is a comprehensive security analytics tool for a single tenant. It uses a score-based approach to provide actionable recommendations to enhance security. However, MSPs should be aware that the scoring process fails to fit the needs of scaling MSPs in terms of business exceptions, managing multiple clients, remediation and alerting, not to mention making an assessment which is independent of MS upselling.

How to Protect Against the Four Largest Cybersecurity Threats to Your Supply Chain

Digital technology is becoming an increasingly essential part of nearly every industry, and supply chains are no exception. In recent years, supply chains have become more dependent on digital solutions, from manufacturing, packing, and shipping processes, to storing records in the cloud. While digital technology increases speed, efficiency, and interconnectivity across industries, this increased complexity can also lead to higher gaps in cybersecurity.

Dynamic Data Masking | (Sanjay - Executive Director, MSCI)

Here are some highlights of the conversation between Sanjay (Executive Director, MSCI) and Venky (Founder, Indusface). Sanjay has worked in Microsoft for over 14+ years and shares his experience on secure coding best practices & methods to handle customer-sensitive data. Key highlights from the discussion.

Budget Shifting and Changing Market Dynamics: Impact on Cybersecurity

In this video, we discuss the shifting of budgets and the efforts of individuals to maximize their budgets in light of incomplete payments. These changes in buying behavior are expected to create different market dynamics. From a cybersecurity perspective, the impact can be detrimental for certain companies as aggressive budget cuts may occur. We are already witnessing a trend where some believe automation, like chat GPT, can solve their security challenges. However, it is important to note that expertise is crucial in utilizing such tools effectively. While they can enhance efficiency and address skill shortages, they cannot substitute for a comprehensive security budget.