HP Wolf Security and the Industrialization of Cybercrime

HP Wolf Security and the Industrialization of Cybercrime

This week HP had a briefing on their latest security report, and it wasn’t pretty, but it implies a level of weaponized cyber threats that will continue to advance at rates that ...

HIPAA Compliance & The Security Rule

Within the HIPAA Security Rule are Administrative, Physical, and Technical Safeguards. These safeguards are as important to understand as they are to implement, so let’s get some clarifications for the non-initiated. Many healthcare entities and their business associates ...
Stronger Security Posture

Stronger Security Posture: Building Your Program

In the first part of this two-part blog series, we touched on understanding your security posture, training your employees, and […] ...
Google software security

Upskilling IT Security Talent a Smart Bet 

With demand for cybersecurity professionals at an all-time high and companies facing acute staffing shortages, organizations should look to upskilling young cybersecurity workers as an employee retention strategy, according to a report ...
Security Boulevard
Your Keys to Better Healthcare Information Security

Your Keys to Better Healthcare Information Security

As your use of medical software increases, so does the value of your healthcare data. Protecting patient health information (PHI) is now more critical than ever. You should know that great strides ...
Detecting transaction replacement attacks with Manticore

A Typical Day as a Trail of Bits Engineer-Consultant

Wherever you are in the world, a typical day as a Trail of Bits Engineer-Consultant means easing into your work. Here’s a short video showing some of our European colleagues describing a ...
hishing Reaches All Time High

Phishing Reached All-Time High: Social Engineering News

Phishing reached an all-time high in the first quarter of 2022. To clarify what this means, in the first quarter […] ...
Phishing Scams Are on The Rise, Here’s How to Protect Your Business

Phishing Scams Are on The Rise, Here’s How to Protect Your Business

Across every single area of data breaches, one single tactic is responsible for a huge proportion of damages. Phishing, which accounts for 36% of all data breaches, is one of the easiest ...
diversity cybersecurity

TechStrong Con: Diversity Key to Solving Cybersecurity Talent Shortage

The only way to address the cybersecurity talent shortage is to further invest in diversity, equity and inclusion. DEI can provide the added benefit of bringing a wide range of perspectives to ...
Security Boulevard
cybersecurity edge data breaches gap cybersecurity remote

Workforce Shortage Affecting Cybersecurity Posture

The shortage of IT security professionals is negatively affecting organizations as they struggle to keep assets safe in an era of rising threats and increasing IT complexity.  These were the results of ...
Security Boulevard