Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Nearly 6k Patients Lose Data to Utah Medicaid Breach

The Utah Medicaid office offers healthcare to qualifying patients throughout the state. These patients rely on the organization to provide them with their medical insurance and to offer other services to them. While providing those services, the organization maintains health and wellness information as well as personal data. That's why it's concerning that the Utah Medicaid office recently experienced a self-caused data breach.

Weekly Cybersecurity Recap June 16

Data breaches are becoming more prevalent and serious each week in 2023, but this week was a bad one for the MOVEit file transfer service, as well as medical organizations and schools and school districts. Anyone utilizing MOVEit should immediately patch the service for their protection, but we're going to go into specifics about that breach, as well as breaches impacting the Pearland, Texas school district, Intellihartx, the MN Department of Education, and the Utah Medicaid system.

The Importance of Visibility | CYBR Pride

We are so proud to share CYBR Pride Employee Resource Group members Luke Thomas, Ani King and Fayssal Chenna as they discuss the importance of visibility and what it means for the LGBTQIA+ community. Listen to them talk about the power of representation and how we can all contribute to creating a safe space for everyone.

Helping Customers Optimize and Secure Digital Transformation

Rewind a couple of years and enterprises were heavily focused on acquiring new tech to drive forward their digitization plans. Then, when the pandemic struck, organizations were forced to fix any technology gaps in their environment and digitize services to hastily plug these gaps.

How to Use Algorithms to Identify Suspicious Activity in Real-Time

The growth of fraudulent activity poses a significant threat to businesses in today's increasingly digital environment. The techniques fraudsters use are continuously evolving-making it difficult for traditional rule-based systems to stay up, as the estimated corporate revenue lost to fraud stands at $4.7 trillion globally every year. Employing increasingly advanced and dynamic fraud detection techniques have become essential. Machine learning is the most promising technology tool to combat financial fraud.

10 Cybersecurity Tips for Business Travel & Remote Employees

Many modern organizations operate in a distributed model, with branch locations and endpoints deployed outside of a physical office. The concept of the network perimeter has expanded dramatically in recent years. It has been pushed by two significant post-pandemic milestones: the implementation of remote work and the return to business travel.

A Cybersecurity (Installation) Odyssey in the South Pacific

Trustwave recently completed an almost three-year-long project that took the team to several of the most exotic Pacific paradises on the map. The trip was not a vacation as we spent long days helping install a wide variety of defensive platforms designed to protect national governments from cyberattacks, but one really couldn’t complain about the location.

Secure egress access with DNS Policy and NetworkSets

One of the common concerns about migrating applications to Kubernetes is the control over the network traffic egressing your environment. Due to its highly dynamic architecture, Kubernetes will not tie a specific IP address to an application by default. Instead, it will lease a different IP address from an IP pool whenever the application restarts.