Security Officer or Professional

New, Tips and Best Practices for Security Professionals.

  • Security Control Validation Assessment Case Study

    Security Control Validation Assessment Case Study

    Read our case study that breaks down a Security Control Validation Assessment (SCVA) which was performed to challenge the assumptions on our clients' security posture.

    Read More
  • Mobile health apps leak sensitive data through APIs, report finds

    Mobile health apps leak sensitive data through APIs, report finds

    Ben Denkers provides commentary for this piece, focused on a recent report from cybersecurity researcher Alissa Knight and mobile security company Approov.

    Read More
  • Learn How To Prepare For A Potential Iranian Cyber Attack

    Download
  • Why Working With a Security Consulting Partner Can Help Reduce Cyber Risk

    Why Working With a Security Consulting Partner Can Help Reduce Cyber Risk

    The market for working with a security consulting partner has increased. Working with a security consulting partner can help your cybersecurity strategy.

    Read More
  • Why Validation of People, Process & Technology is Important

    Why Validation of People, Process & Technology is Important

    CynergisTek experts discuss topics around validation in the cybersecurity world and why it is so important to try to keep up with today's threats.

    Read More
  • Download Our API Sentry Service Overview Sheet

    Download
  • Hackers Calling Fair Game on Healthcare Institutions

    Hackers Calling Fair Game on Healthcare Institutions

    Caleb Barlow discusses the onslaught of ransomware attacks in 2020 and how healthcare institutions should up their security infrastructure to protect themselves.

    Read More
  • Security Validation and Why Should it be the New Mindset in 2021

    Security Validation and Why Should it be the New Mindset in 2021

    While the concept of security validation has been around for some time, at CynergisTek we recommend that security validation become the ethos of all organizations to strengthen one’s cyber hygiene.

    Read More
  • Privacy and Security Issues in Healthcare in Mergers and Acquisitions

    Privacy and Security Issues in Healthcare in Mergers and Acquisitions

    WIth security and privacy integration risks in mergers and acquisitions, knowing the right questions to ask and understanding the answers being provided could be the key to making the deal happen.

    Read More
  • The Next Normal CTEK’s New Services to Adapt to 2020 and Beyond

    The Next Normal CTEK’s New Services to Adapt to 2020 and Beyond

    In this episode, CynergisTek experts describe the new services CynergisTek has developed to meet industry demands in needing security validation solutions.

    Read More
  • How Mature is Your Cybersecurity Program?

    Learn More
  • Cynergistek’s CISO Weighs in on Recent SolarWinds Hack

    Cynergistek’s CISO Weighs in on Recent SolarWinds Hack

    CynergisTek, Inc.’s Chief Information Security Officer (CISO), Thomas Graham gives his outlook and provides recommendations on this egregious hack of a lifetime.

    Read More
  • From weaponized AI to threats against the vaccine rollout, here are 6 cybersecurity trends to watch in 2021

    From weaponized AI to threats against the vaccine rollout, here are 6 cybersecurity trends to watch in 2021

    Caleb Barlow, CEO of CynergisTek, predictions on healthcare cyberattacks was featured in this recent article.

    Read More
  • Medical Device Security Challenges

    Medical Device Security Challenges

    In this white paper, CynergisTek and Asimily have outlined the challenges stakeholders are dealing with from addressing business needs, execution of strategy, and meeting missions and objectives.

    Read More
  • FDA Seeks Comment on Guidelines to Prevent Hacking of Medical Devices

    FDA Seeks Comment on Guidelines to Prevent Hacking of Medical Devices

    David Finns offers his expertise for this piece, which details the FDA’s recent paper, called Communicating Cybersecurity Vulnerabilities to Patients: Considerations for a Framework.

    Read More
  • Security Resilience in 2021 - Part 2

    Security Resilience in 2021 - Part 2

    David Finn, EVP of Strategic Innovations joins for part two of Security Resilience in 2021 to discuss cyber resilience from a couple of key perspectives.

    Read More
  • Telehealth Is The Future But May Also Be Healthcare Security’s Achilles' Heel

    Telehealth Is The Future But May Also Be Healthcare Security’s Achilles' Heel

    Caleb Barlow, CEO of CynergisTek details the advantages of telehealth, as well as the security issues it simultaneously brings to the healthcare industry.

    Read More
  • API & Information Blocking: Where are your risks and what you can do to prepare59:43

    API & Information Blocking: Where are your risks and what you can do to prepare

    A technical session on “API & Information Blocking: Where are your risks and what you can do to prepare” to learn about how to identify security vulnerabilities for CTEK Subject Matter experts.

    Watch Video
  • 12 Key Employee Protocols To Help Businesses Safeguard Digital Assets

    12 Key Employee Protocols To Help Businesses Safeguard Digital Assets

    Caleb Barlow details tips from members of Forbes Technology Council on vital steps all employees need to take to ensure robust digital security.

    Read More
  • Sizing Up Synthetic DNA Hacking Risks

    Sizing Up Synthetic DNA Hacking Risks

    David Finn details a new study called Cyberbiosecurity: Remote DNA Injection Threat in Synthetic Biology, by security researchers at Ben-Gurion University of the Negev in Israel.

    Read More
  • Security Resilience in 2021 - Part 1

    Security Resilience in 2021 - Part 1

    Today David Finn, EVP of Strategic Innovations joins us to discuss cyber resilience from a couple of key perspectives.

    Read More
  • HHS Rule Changes Allow for Cybersecurity Donations

    HHS Rule Changes Allow for Cybersecurity Donations

    Marti Arvin discusses the final rule federal regulators issued containing provisions that allow hospitals and healthcare delivery systems to donate cybersecurity technology to physician practices.

    Read More
  • Healthcare Supply Chain the Weak Link for Security

    Healthcare Supply Chain the Weak Link for Security

    In this article David Finn discusses the need for leaders to take time to understand where their systems’ weaknesses lie and ensure vendors prioritize security and data privacy.

    Read More
  • loading
    Loading More...