Free Rugby World Cup Streaming Service Can Be a Foul Play

The internet is a great source for information and entertainment. But it is also rife with fraud schemes, scams, misinformation, and other tactics to exploit your personal and financial data. Cybercriminals often focus on high-profile global events to find target victims in hopes of stealing their financial data. These criminals Continue Reading

Forbes CISO Research: Managing Risks with Limited Resources

Business security demands that chief information security officers (CISOs) make difficult decisions in order to protect their organization’s sensitive and proprietary data as well as their brand reputation. Today’s CISOs are tasked with the challenge of allocating limited funds and resources to the highest-return cybersecurity projects which can range from Continue Reading

Urgent Updates for 70, 76, and 78 and Exim CVE-2019-10149 | cPanel Newsroom

In a post on the cPanel Blog last night we shared information regarding an exploit that had been identified in Exim. This exploit allows attackers to execute code as the root user on your server without authentication and was rated a 9.8 out of 10 in severity. While Version 80 was never vulnerable Continue Reading

Urgent Updates for 70, 76, and 78 and Exim CVE-2019-10149 | cPanel Newsroom

In a post on the cPanel Blog last night we shared information regarding an exploit that had been identified in Exim. This exploit allows attackers to execute code as the root user on your server without authentication and was rated a 9.8 out of 10 in severity. While Version 80 was never vulnerable Continue Reading

Urgent Updates for 70, 76, and 78 and Exim CVE-2019-10149 | cPanel Newsroom

In a post on the cPanel Blog last night we shared information regarding an exploit that had been identified in Exim. This exploit allows attackers to execute code as the root user on your server without authentication and was rated a 9.8 out of 10 in severity. While Version 80 was never vulnerable Continue Reading

Prevent Leaks of Sensitive Business Data with Security Gateway

Businesses of all types must maintain records containing personal information about their employees and customers, and executives and clients alike have a mutual interest in protecting that data. But there’s no guarantee that every employee will treat confidential account numbers, Social Security numbers, passport numbers or other personal data with Continue Reading

Why Top Healthcare Institutions are Moving Toward Integrated Security Solutions

According to a report posted by the Office of the National Coordinator for Health Information Technology, 87 percent of office-based physicians had adopted some form of electronic health record (EHR) as of 2015. This is more than double the 42 percent that had done so when data was collected in Continue Reading

Information Governance for Healthcare Institutions

Information governance is nothing new, but for it to be effective, it requires understanding, flexibility, and collaboration between a variety of teams and departments. Fortinet’s Susan Biddle offers her insights into the role of information governance in organizational security and how healthcare organizations can adapt. Can solid information governance boost Continue Reading

The Need for Situational Awareness

As human beings, we are continually looking for knowledge or information to help improve any situation. If we live or work in a crowded city, for example, we want to know which routes are best to avoid getting stuck in traffic. When we enter a restaurant or movie theater we Continue Reading

Video Gallery: Ladi Adefala and Hussein Syed Discuss Healthcare Security Following HIMSS17

On February 21, Hussein Syed, Chief Information Security Officer at Barnabas Health System, and Ladi Adefala, Senior Security Strategist at Fortinet, led a roundtable discussion at HIMSS17 about the evolving challenges of securing the next-generation healthcare enterprise. The session was geared toward providing attendees with information around the current threats Continue Reading

>