Select Page

Blog

We know you have many questions. That’s why our team has curated top-notch resources to help you along your healthcare cybersecurity and compliance journey.

Compliance & Cybersecurity & Risk Management Blogs from Industry Experts

SQL Injection in OpenEMR Identified and Recommendations

SQL Injection in OpenEMR Identified and Recommendations

This post documents a blind time-based SQL injection in the PostCalendar module discoveredin OpenEMR 8.0.0. The ...
Identity Under Pressure: Why Access Management Is Now a Patient Safety Issue in Healthcare

Identity Under Pressure: Why Access Management Is Now a Patient Safety Issue in Healthcare

For years, healthcare cyber risk was framed around the perimeter. Firewalls. Endpoints. Network defenses. The ...
NIST CSF 2.0 in Healthcare: From Compliance to Governance

NIST CSF 2.0 in Healthcare: From Compliance to Governance

A True Story on Implementation Healthcare did not wake up one morning and decide to adopt a new cybersecurity ...
JPM 2026 Takeaways: Cybersecurity in Healthcare PE Diligence

JPM 2026 Takeaways: Cybersecurity in Healthcare PE Diligence

The 2026 J.P. Morgan Healthcare Conference reinforced a familiar but increasingly disciplined theme among ...
Cyber Risk in Healthcare Is Entering a New Phase

Cyber Risk in Healthcare Is Entering a New Phase

A conversation with Greg Garcia For much of the past decade, cyber risk in healthcare has been defined by ...
OCR’s 2026 Cybersecurity Update to Healthcare: From Risk Analysis to Enforced Risk Management

OCR’s 2026 Cybersecurity Update to Healthcare: From Risk Analysis to Enforced Risk Management

January 2026 OCR Update: In its January 2026 Cybersecurity Newsletter, the HHS Office for Civil Rights (OCR) ...
Healthcare Cybersecurity Basics: What CISOs Worry About at 3 A.M.

Healthcare Cybersecurity Basics: What CISOs Worry About at 3 A.M.

Tom Bunger, Fronz Batot, Cary Brown I was talking recently with the CISO of a large health system and I asked him: ...
Health Care Cybersecurity and Resiliency Act of 2025: What It Signals for Healthcare Security

Health Care Cybersecurity and Resiliency Act of 2025: What It Signals for Healthcare Security

The reintroduction of the Health Care Cybersecurity and Resiliency Act of 2025 shows that Congress continues to ...
Why Web & Mobile App Pen Testing Is Critical in Healthcare

Why Web & Mobile App Pen Testing Is Critical in Healthcare

By Oluwole OkunseindePrincipal Consultant, Technical Testing Services In today’s healthcare environment, the line ...
Turning Cybersecurity into a Culture of Trust at Cleveland Clinic

Turning Cybersecurity into a Culture of Trust at Cleveland Clinic

How a unique business liaison role is helping clinicians, executives, and cybersecurity teams speak the same ...
The Perennial Cybersecurity Problem: Tool Proliferation and the Talent Crisis

The Perennial Cybersecurity Problem: Tool Proliferation and the Talent Crisis

By:  Larry Mraz, CISSP, CRISC, CHPP, CISM, CISA, BCMS  vCISO/Principal Consultant Cybersecurity is at a breaking ...
The Human Factor: Why Phone Scams Are Still So Effective in Healthcare

The Human Factor: Why Phone Scams Are Still So Effective in Healthcare

By Sebastian Pina, OSCP, OASP, PNPT, PWPA, Security+Senior Consultant, Technical Testing ...
No results found.

Register Today to Get Monthly Invites

Featured Resource
No results found.