When You Have No Bars
A major network update failure led to a massive cellphone service outage across the US, impacting thousands and disrupting essential services. Despite cellular networks’ redundancy, the incident highlighted vulnerabilities in communication infrastructure when multiple base stations fail simultaneously.
The Balancing Act: Online Security vs. Privacy
Data is both currency and vulnerability, which leads to a conflict between privacy and security. This intersection reveals a harsh reality—enhancing cybersecurity to prevent or fight off threats
Our Most Common Pen Test Finding? Vulnerabilities in Third-Party Components
Would You Like To Play A Game? Increasing Security and Compliance Through Gamification of Tabletop Exercises
Tabletop exercises have been used for years to mimic incident response and disaster recovery situations. They are designed to test people or processes to allow teams to practice getting out of trouble before the trouble happens.
Leviathan Security Group Offers Pre-Draft Comments on NIST SP 800-66, Implementing the HIPAA Security Rule
Leviathan submitted general comments on what Revision 2 should cover, as well as specific feedback on updates needed to the standard, which was first published in 2008. As readers will be aware, a lot has changed in that time, including the explosive growth in cloud computing and Software As a Service (“SaaS”) tools.
Contingency Planning and Business Continuity
A robust business continuity plan requires coordination across the company and time, but there are things that you can do today to help your company in the current pandemic. A quick response crisis plan may already exist within your company.