Regulatory Compliance

Business Restrictions vs Safety Protocols, Medical Data: The Hackers' Must-Have, The Greatest Heist, Pinching Fingerprints, Insecure Vertebrae, and Unwanted Passengers. It's CISO Intelligence for Monday 24th February 2025.

Business Restrictions vs Safety Protocols, Medical Data: The Hackers' Must-Have, The Greatest Heist, Pinching Fingerprints, Insecure Vertebrae, and Unwanted Passengers. It's CISO Intelligence for Monday 24th February 2025.

How much security is too much, healthcare: the prime target for data theft, the highest of heists and its fallout, the downside of user ID information, when the digital backbone isn't quit fully connected, and the risks of third-party software carrying a little fungus.
Read More
Proxy Firewalls: the Silent Sentinels, NERC CIP Patching, 3AM Sneaking in, PaxtonNet2 Weak Spots, and the Belt and Braces Approach to Security. All in the Tuesday 31st December 2024 Edition of CISO Intelligence!

Proxy Firewalls: the Silent Sentinels, NERC CIP Patching, 3AM Sneaking in, PaxtonNet2 Weak Spots, and the Belt and Braces Approach to Security. All in the Tuesday 31st December 2024 Edition of CISO Intelligence!

We close out 2024 looking at proxy firewalls watching over your data, the NERC CIP strategy dance, the 3AM malware adaptation game being afoot, the holes in PaxtonNet2, and covering all security bases. Cybersecurity monitoring never stops, and nor do we. See you in 2025!
Read More