Houston Eye Associates, the largest provider of ophthalmological and optometric care in Texas, has built a strong reputation over its 50 years of operation. As the organization has grown, so too has its commitment to maintaining a robust...
Read MoreCyber-attacks targeting healthcare facilities ruthlessly exploit personal, vulnerable and highly sensitive information. It’s one of the few industries where attacks can lead to life and death scenarios.
Read MoreA doctor might describe the condition of cybersecurity in healthcare 2022 as "critical." In a little over two years, healthcare IT has seen a decade's worth of changes. From a security point of view, most have been for the worse.
Read MoreBetween staff shortages and COVID variants, healthcare providers have had plenty to worry about during the past two years. Now alongside these worries, cybersecurity issues in healthcare are also putting patient care in jeopardy. Healthcare is one...
Read MoreGeography, price, and whether the healthcare provider is in their insurance network or not are often the main factors that lead consumers to choose a medical professional. Lately, however, the cybersecurity posture of the organization has started to...
Read MoreWith remote care, connected devices, and more efficient use of data digitizing healthcare delivery, cybersecurity has never been more vital for providers. Despite the benefits to patient care, however, there are some major weak spots that still...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Automated Moving Target Defense (157)
- Threat Research (135)
- Cyber Security News (132)
- Morphisec Labs (124)
- Morphisec News (54)
- Adaptive Exposure Management (14)
- Defense-in-Depth (13)
- Ransomware (12)
- Preemptive Security (11)
- Gartner (10)
- Continuous Threat Exposure Management (CTEM) (9)
- Microsoft (8)
- In-Memory Attacks (7)
- Healthcare Cybersecurity (6)
- Advanced Threat Defense (5)
- Legacy Security (5)
- Artificial Intelligence (4)
- Financial Cybersecurity (4)
- Linux Cybersecurity (4)
- Fileless Malware (3)
- Threat and Vulnerability Management (2)
- Managed Service Providers (1)