Sorry, you need to enable JavaScript to visit this website.

BROWSE OUR ELECTROBLOG

Find additional Electroblogs using the search box below.

Vaccine Privacy: 4 Ways to Protect Your Personal Data in a Pandemic December 14, 2021

by Maureen Donohue

Every day, millions of people are being vaccinated against COVID-19. For this effort to succeed, states need to collect personal health data in individual immunization registries. This data is essential for monitoring vaccination progress, reporting…

read more
Blog
Ransomware Attacks: A Special Concern for Healthcare November 18, 2021

by Shawn McEvoy

Ransomware attacks have been in the headlines recently, with attacks surging across industries. Government and business targets have ranged from gas line operators, meat suppliers and auto manufacturers to educational institutions, city governments and local…

read more
Blog
SOAR (Security Orchestration, Automation, and Response) October 20, 2021

by Eric Wesley

In the security operations space, SOAR stands for security orchestration, automation and response. The flexible technology can use a stack of compatible software programs to help organizations manage security threats, respond to security events and automate…

read more
Blog
Inside the Executive Order on Improving the Nation’s Cybersecurity September 21, 2021

by Steve Brady

In the wake of the Russian attacks in December and the more recent Colonial Pipeline Ransomware attack, President Biden issued the Executive Order on Improving the Nation’s Cybersecurity. Aimed at strengthening the U.S. government’s cybersecurity posture, the…

read more
Blog
SolarWinds Attack: Lessons Learned August 19, 2021

by Sutapa Ghadiali

Late 2020 was abuzz with another breaking news story. No, it wasn’t the pandemic or politics. This time, it was the SolarWinds supply chain attack that went undetected for months! SolarWinds is one of the largest network management system software…

read more
Blog
IT Audit: Preparing Your Supporting Documents July 16, 2021

by KB Mandefro

When it comes to IT audits, it can feel daunting to figure out what documentation is needed. Depending on the audit goal and scope, auditors routinely request supporting documents to validate the effectiveness, efficiency and compliance of Information…

read more
Blog
Top