Resources

Blog

Friday Five: Adjusting Cyber Standards, Supply Chain Threats, & More

As Chinese ATPs and other cybercriminals escalate attacks against U.S. critical infrastructure, changes to cybersecurity standards and practices may be on the way for healthcare organizations and government agencies. Learn all you need to know in this week's Friday Five.SENATE BILL EYES MINIMUM CYBERSECURITY STANDARDS FOR HEALTH CARE INDUSTRY BY MATT BRACKENSenators Ron Wyden and Mark Warner...
Blog

Friday Five: Data-Stealing Malware, Ransomware Groups Casting a Wide Net, & More

Ransomware groups continue to target organizations across multiple industries. Meanwhile, government entities are urged to be vigilant of data-stealing malware, law enforcement continues to punch back against cybercrime groups, and more. Get up to speed in this week's Friday Five.SOCIALLY SAVVY SCATTERED SPIDER TRAPS CLOUD ADMINS IN WEB BY ELIZABETH MONTALBANOThe ransomware group Scattered Spider...
Blog

An Overview of Endpoint Detection and Response (EDR)

EDR, or endpoint detection and response, is a cybersecurity technology that monitors and collects data from endpoints to detect, analyze, investigate, and respond to cybersecurity threats. Learn more about EDR and how it can help organizations in this blog.