Summary of the HIPAA Security Rule

Navigating and interpreting the HIPAA Security Rule can be a difficult proposition.  The Department of Health and Human Services (DHHS) provides a summary to assist with understanding the in's and out's.

Hacker's Playbook 2nd Edition

How do hackers think? Understanding how potential hackers think and act is critical to combat evolving security risks. This white paper explains how continuous security validation, also known as attack simulation, automates the actions of a hacker to enable you to uncover breach scenarios before your attackers.

Need more details? Contact us

We are here to assist. Contact us by phone, email or via our social media channels.