Identity security explained in the Belgian NIS2 law
Belgium was the first European country to transpose NIS2 into national law, in April, through its “NIS2 law”. This set them apart, in a positive fashion, from their French, Dutch, and German neighbours, all late in the transposition process due to political instability. In parallel, the CCB (Center for Cybersecurity Belgium), the local agency in […]
A Critical Step Forward for Healthcare: Breaking Down the Proposed HIPAA Security Rule Framework Updates
Healthcare is one of the most targeted sectors by malicious actors, with the number of breaches growing consistently year on year. Despite the common security risks affecting healthcare environments and numerous headline-hitting data breaches, healthcare remains under-resourced to defend against the increasing number of cyberattacks. In early January 2025, HIPAA proposed a set of updates […]
New Cybersecurity Regulations in New York: What General Hospitals Must Do to Stay Compliant
Every general hospital in New York State is now experiencing a significant shift in their cybersecurity requirements. As of October 2, 2024, the New York State Department of Health has introduced comprehensive amendments to Part 405.3 that mandate stronger cybersecurity controls for all 195 general hospitals in the state. Hospitals that are required to comply […]
Navigating CMMC Compliance: How Silverfort Can Streamline Your Journey
As the threat landscape evolves, attackers are setting their sights on organizations that work closely with critical national infrastructure and governmental agencies. With over 300,000 companies supplying the U.S. Department of Defense (DoD), any breach could pose a significant threat to national security. Organizations – especially those involved in this sprawling supply chain – need […]
Comment sécuriser les « processus automatiques » selon la transposition française de NIS2 ?
Le référentiel de l’ANSSI publié par le MagIT pour les entités assujetties à la directive NIS2 en France mentionne à plusieurs reprises les risques liés aux accès des « processus automatiques ». Objectif #10 : L’entité sécurise les accès distants à ses SI réglementés En l’absence d’un tel objectif, l’entité s’expose, par exemple, à des vols de secrets […]
How Organizations Can Align with NIST’s Cybersecurity Framework Version 2.0
Applying security controls across an organization’s environment must be a top priority for every organization, regardless of its size, sector, or maturity. To help guide organizations in managing and reducing their cybersecurity risks, the National Institute of Standards and Technology (NIST) created a security framework that provides guidelines for organizations to manage and mitigate cybersecurity […]
Transposition française de la directive NIS2 – en matière d’identité, quelles sont les mesures attendues?
L’ANSSI travaille depuis plusieurs mois sur la transposition de la directive européenne NIS2 en droit français. Récemment, une première ébauche a circulé sur Internet, initialement mise en ligne par LeMagIT, que plusieurs journaux ont décortiqué. En attendant la publication d’une version définitive, ce document fournit déjà une perspective importante sur l’approche des autorités dans la […]
Unlocking HIPAA Compliance: Navigating Access Control and MFA Guidelines
As technology continues to revolutionize healthcare operations, protecting patient data has never been more challenging. In the ongoing struggle against data breaches, last year marked a tipping point, as an unprecedented 133 million healthcare records were breached, according to the HIPAA Journal. In this blog, we will delve into the HIPAA compliance framework, with a […]
The Importance of CJIS Compliance: Meeting the Identity Security Requirements of the CJIS Security Policy
If your organization has access to sensitive data from government agencies, you will most likely have to adhere to the Criminal Justice Information Services (CJIS) compliance requirements. CJIS compliance helps prevent unauthorized access to sensitive data, or Criminal Justice Information (CJI), and protect organizations from potential threats such as ransomware attacks and sanctions. In this […]