Category: Security

Security

SAML explained

SAML explained in plain English: https://www.onelogin.com/learn/saml SAML is an acronym used to describe the Security Assertion Markup Language (SAML). Its primary role in online security is

Read More
Security

Threat Hunting – Practical Guide

Resource: https://www.threathunting.net/files/hunt-evil-practical-guide-threat-hunting.pdf To begin, let’s clarify what threat hunting is: Threat hunting is the human-driven, proactive and iterative search through networks, endpoints, or datasets in

Read More

Threat Hunting Techniques, What is Hunting? Maturity model.

Resources: threat hunting: https://www.threathunting.net/ sqrrl archive: https://www.threathunting.net/sqrrl-archive practical hunting: https://www.threathunting.net/files/hunt-evil-practical-guide-threat-hunting.pdf huntpedia: https://www.threathunting.net/files/huntpedia.pdf framework cyber threat hunting: https://www.threathunting.net/files/framework-for-threat-hunting-whitepaper.pdf Threat Hunting is a creative process. One’s abilities

Read More

HITRUST – phases, etc

This process has four main phases: readiness, remediation, validated assessment and the HITRUST Quality Assurance review. The culmination of the HITRUST  assessment process is certification.

Read More

HIPAA – Business Associates

HIPAA-covered entities must have a business associate agreement (BAA) in place with each of their partners to maintain PHI security and overall HIPAA compliance. WHAT

Read More

HIPAA – Security Risk Assessment

https://www.healthit.gov/topic/privacy-security-and-hipaa/security-risk-assessment-tool SRA Tool Excel Workbook Version 3.3 See the SRA Tool User Guide available for download on HealthIT.gov for more detailed instructions and FAQs. Instructions

Read More

Prodigy 13 Newsletter

Sign up for our monthly newsletter for business leaders on minimizing cybersecurity risk.