-
Overview of Privacy Laws and Data Privacy in Healthcare
Howdy! In this post, I have listed some concepts related to privacy laws and data privacy in the healthcare context. Disclaimer: This information is meant for educational purposes only. It…
-
Consequences of Poor Data Privacy
Data privacy is not just a technical concern, it’s a cornerstone of trust between individuals and organizations. However, when data privacy is poorly managed, the consequences can be devastating. Here…
-
Incident Response using the NIST Guidelines
The National Institute of Standards and Technology (NIST) provides structured guidelines for incident response to help organizations effectively manage cybersecurity threats. These guidelines can be found in the framework for…
-
Enhancing GRC Efforts through Technology
By Jorge Castaneda Leveraging Technology and tools can help transform Governance, Risk, and Compliance Management. GRC is a crucial aspect of business operations, ensuring that organizations meet regulatory requirements, manage…
-
A Brief Understanding of Health Privacy and Privacy Torts – From an IT Perspective
By Jorge Castaneda Over the last several years, I’ve made it a point to get more educated and experienced with data privacy. I’ve read several books along the way, watched…
-
Why Multi-Factor Authentication is Essential for Online Security
By Jorge Castaneda We are online almost every day if not every day! Yet, a lot of people don’t take online security very seriously. Online security is more important than…
-
Massive Data Leak: 760,000 Employee Records Exposed
A hacker known as ‘Nam3l3ss’ has leaked over 760,000 employee records from major organizations, including Bank of America, Koch, Nokia, JLL, Xerox, Morgan Stanley, and Bridgewater. The compromised data encompasses…
-
Deloitte Breach: Brain Cipher’s Claims and Implications
In September 2024, the threat actor known as Brain Cipher claimed responsibility for leaking internal communications from Deloitte, a leading global auditing firm. The breach reportedly occurred when an Apache…
-
Docker Remote API servers Exploited
Cybercriminals are exploiting misconfigured Docker Remote API servers to deploy the Gafgyt malware, enabling them to launch Distributed Denial-of-Service (DDoS) attacks. Originally targeting Internet of Things (IoT) devices, Gafgyt has…











