Tag: Care
-
Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database
Video and audio of therapy sessions, transcripts, and other patient records were accidentally exposed in a publicly accessible database …
-
Why Don’t We Care About Identity Security? – Don Baham – CSP #155
Identity & Access Management – Why do organizations still insist that provisioning/deprovisioning is an IT function? Effective IAM requires …
-
Terminology Matters: Changing ‘Cybersecurity’ to Data Care – Ron Gula, Cyndi Gula – CSP #143
Segment description coming soon!Cybersecurity touches all our lives, however there is a belief that only experts in all of the technical …
-
L.A. Care agrees to $1.3M settlement for breach-related HIPAA violations
Major U.S. public health plan …
-
AppSec Consolidation for Developers: Why You Should Care
With the increasing pressure to streamline application security (AppSec), you may be hearing a lot about consolidation these days. What is …
-
How To Take Care Of Your Eyes
Your eye health is very important. It’s easy to overlook the significance of good eye health when you’re focused on taking care of …
-
California Bill to Stop Dragnet Surveillance of People Seeking Reproductive and Gender-Affirming Care Passes Key Committees
A.B. 793, a bill authored by Assemblymember Mia Bonta to protect people seeking abortion and gender-affirming care from dragnet-style …
-
Are Source Code Leaks the New Threat Software vendors Should Care About?
Less than a month ago, Twitter indirectly acknowledged that some of its source code had been leaked on the code-sharing platform GitHub by …
-
5 Reasons You Should Care About Unmanaged Assets
Unmanaged devices pose a significant challenge and risk for many organizations. Here are the five reasons you should care about unmanaged …
-
Fifth of Government Workers Don’t Care if Employer is Hacked
Ivanti warns of …
-
Why CISOs Should Care About Brand Impersonation Scam Sites
Enterprises often don’t know whose responsibility it is to monitor for spoofed brand sites and scams that steal customers’ trust, money, …
-
CrowdStrike’s James Yeager: Public, Health Care Sectors Should Stay Ahead of Identity-Based Attacks, Data Extortion
“This year, public sector organizations and healthcare providers alike will need to take a unified identity threat protection approach to …
●●●