Introduction to Incident Response If you’ve ever suffered a breach, you know what it’s like to work furiously to stop the cyber bleeding, find where your defenses need reinforcing, and enhance your organization’s threat detection...
New HHS Cybersecurity Performance Goals Help to Prioritize Security Practices, But Truly Protecting Healthcare Organizations Takes Much More
This past week, as a follow on to its cybersecurity strategy concept paper published in December, the Department of Health and Human Services (HHS) introduced Health and Public Health Sector (HPH) Cybersecurity Performance Goals (CPG) to help healthcare organizations...
Pushing the Healthcare Sector to Improve Cybersecurity
Steve Cagle, CEO of Clearwater, on HHS’ New Cyber Performance Goals
Sophisticated phishing and deepfakes: How generative AI brings new threats for hospitals
Insurance Broker Notifying 1.5 Million of Health Info Hack
California Firm Said August Attack Affected Clients’ Data
Network Cybersecurity Starts with Network Maintenance
Author: Joshua Frazee, Information Security Consultant Healthcare organizations haven’t always provided their Information Technology (IT) infrastructure, mainly their networks, with the necessary attention to ensure optimal performance and network cybersecurity. The...
HHS Unveils Voluntary HPH Cybersecurity Performance Goals
Healthcare Defender: Michael Gross, Manager of Cybersecurity Intelligence | Cleveland Clinic
Dave Bailey, Clearwater's VP of Consulting Services, talks with Cleveland Clinic's Manager of Cybersecurity Intelligence, Michael Gross, about cybersecurity structure in a large, complex organization, the humbling connection between cybersecurity and patient safety,...
Report: Hackers Scammed $7.5M From HHS Grant Payment System
Money Meant for Poor Communities Stolen as Authorities Issued Phishing Scam Alerts
January Cyber Briefing, Featuring Greg Garcia and Iliana Peters
Greg Garcia and Iliana Peters talk with Cleawater CEO, Steve Cagle, about: What went into the 2023 HHS Hospital Cyber Resiliency Landscape Analysis and how it shaped cybersecurity The gaps in cybersecurity organization to organization Regulatory rule making activities...