Steve AluochImplementing Zero Trust Architecture for Cloud Security in HealthcareWriting Inspired by My Google Cybersecurity Certificate ProjectsNov 27
InInfoSec Write-upsbyCybertech MavenHealthcare Hacking: EC-Council’s Hospital Hack CTFExplore healthcare cybersecurity and examine how hackers access patient information from compromised electronic medical record systems.Nov 8
Configr TechnologiesIs Your Software Ready for the New Era of Data Privacy? Here’s What You Need to KnowHave you ever considered how the latest data privacy regulations could impact the way you develop software? If not, it’s time to pay…Nov 5Nov 5
Mack Jackson JrPaging Dr. Hacker: The Hidden Dangers of Using Pagers in HealthcareBy: Professor Mack Jackson Jr.Feb 4Feb 4
AI for Call Centers | Support Customer with AIUnlock HIPAA-Compliant Sales Insights with Bigly Sales IntegrationToday’s businesses rely heavily on data to make smart decisions, and when it comes to industries like healthcare, this data must be handled…Sep 26Sep 26
Steve AluochImplementing Zero Trust Architecture for Cloud Security in HealthcareWriting Inspired by My Google Cybersecurity Certificate ProjectsNov 27
InInfoSec Write-upsbyCybertech MavenHealthcare Hacking: EC-Council’s Hospital Hack CTFExplore healthcare cybersecurity and examine how hackers access patient information from compromised electronic medical record systems.Nov 8
Configr TechnologiesIs Your Software Ready for the New Era of Data Privacy? Here’s What You Need to KnowHave you ever considered how the latest data privacy regulations could impact the way you develop software? If not, it’s time to pay…Nov 5
Mack Jackson JrPaging Dr. Hacker: The Hidden Dangers of Using Pagers in HealthcareBy: Professor Mack Jackson Jr.Feb 4
AI for Call Centers | Support Customer with AIUnlock HIPAA-Compliant Sales Insights with Bigly Sales IntegrationToday’s businesses rely heavily on data to make smart decisions, and when it comes to industries like healthcare, this data must be handled…Sep 26
SecureSlateBeyond SOC 2: Exploring Alternative Compliance Frameworks for Your NeedsDiscover a wider compliance landscape and find the perfect fit for your organization.May 5
InterstellarG0The Watched Player: Chronicles of Surveillance in GamingThe notion that our conversations might be monitored and stored by “analysts” isn’t far-fetched; we are, after all, generating data…Sep 13
Sherry WeiHow to Setup Egress Control in AWSFor Internet bound egress traffic, specifying outbound policy at the IP address level is not sufficient as the domain names of a site can…Apr 14, 2021