Systems | Development | Analytics | API | Testing

The Biggest Threat to the Security of Healthcare Data

When cyberattacks take out business systems, organizations suffer from direct and indirect financial losses. When healthcare systems go down, it’s a matter of life and death. Healthcare organizations were already a frequent target of cybercriminals, and the pandemic has made this situation worse. Infosecurity Magazine reports that healthcare data breaches will increase by 3x in 2021, at a time when so many healthcare providers are burnt out and exhausted from battling the pandemic.

Why Software Cybersecurity and Quality Assurance Go Together

Digital data is the new gold, and hackers will stop at nothing to get yours. In a study by cybersecurity experts at Maryland University, researchers found that cyber-attacks happen once every 39 seconds. As one of the first organizations to quantify cyber-attacks, Maryland University also says that these attacks can affect one out of every three U.S. citizens.

What the new WhatsApp Privacy Policy is all about and what it means for you

It was January 2007 when Steve Jobs officially announced the 1st Generation iPhone. At the time, there’s no doubt that he foresaw how the newly created concept of smartphone applications would become part of our everyday life. Fast forward a decade and we now have apps for literally everything, from trackable maps to online shopping, online banking to instant messaging.

Common Regulations that Data-Driven Entities Need to Know

For public and private entities, data collection is a way of life. That fact has led to the proliferation of common regulations to protect consumers and individuals from unacceptable use or storage of their private data. But it's not just data collection laws companies have to adhere to. There are many US-based and international statutes that put constraints on how they do business. What follows summarizes the most common regulations and how they can affect the work you do, day to day.

The Importance of Zero-Trust Security When Making the Microservices Move

Transitioning to microservices has many advantages for teams building large applications that must accelerate the pace of innovation, deployments and time to market. It also provides them the opportunity to secure their applications and services better than they did with monolithic codebases.

How to Comply with Sweden's PII Data Protection Act

Personal Identifiable Information (PII) has become a headache for most digital-first businesses in recent years. Everyone agrees we need rules to keep personal data safe, but there’s no universal PII Data Protection Act we can all follow. Instead, there is a worldwide patchwork of regulations, many of which have global implications. Sweden is one of the pioneers in data security laws.

How to Prevent and Respond to Data Breaches

Cybercriminals are currently enjoying a golden age. The sudden shift to remote working, combined with the digitization of everyday life, means endless opportunities to compromise systems and access sensitive data. If you don't want your organization to be their next victim, you must have to know how to prevent data breaches.

How to Safeguard Sensitive Data with Security Controls

According to the Ponemon Institutes, "Cost of a Data Breach" report, a data breach's total global cost averaged $3.86 million in 2020. However, a data breach's implications go far beyond financial losses; it can severely hinder an organization's operational capacity and compliance structures.

Lenses upgrade: powerful SQL, Connect multi-tenancy & message headers

We’re continuously releasing new capabilities to enable more people to be productive and compliant when working with Apache Kafka. Our engineers have been hard at work on a great Christmas present for our amazing community of Kafka users. Before unwrapping our latest and greatest release, here’s a sneak peak of what’s inside.