Find additional Electroblogs using the search box below.
by Maureen Donohue
Every day, millions of people are being vaccinated against COVID-19. For this effort to succeed, states need to collect personal health data in individual immunization registries. This data is essential for monitoring vaccination progress, reporting…
by Shawn McEvoy
Ransomware attacks have been in the headlines recently, with attacks surging across industries. Government and business targets have ranged from gas line operators, meat suppliers and auto manufacturers to educational institutions, city governments and local…
by Eric Wesley
In the security operations space, SOAR stands for security orchestration, automation and response. The flexible technology can use a stack of compatible software programs to help organizations manage security threats, respond to security events and automate…
by Steve Brady
In the wake of the Russian attacks in December and the more recent Colonial Pipeline Ransomware attack, President Biden issued the Executive Order on Improving the Nation’s Cybersecurity. Aimed at strengthening the U.S. government’s cybersecurity posture, the…
by Sutapa Ghadiali
Late 2020 was abuzz with another breaking news story. No, it wasn’t the pandemic or politics. This time, it was the SolarWinds supply chain attack that went undetected for months! SolarWinds is one of the largest network management system software…
by KB Mandefro
When it comes to IT audits, it can feel daunting to figure out what documentation is needed. Depending on the audit goal and scope, auditors routinely request supporting documents to validate the effectiveness, efficiency and compliance of Information…