The Food and Drug Administration is urging blood suppliers - a recent target of attacks - to bolster their cybersecurity practices to prevent and mitigate cyber incidents that could affect the supply and safety of critical blood and blood components used for transfusions and other patient care.
At AWS re:Invent 2024, Autodesk unveiled its innovative vision for generative AI in design. From Project Bernini's billion-parameter foundation model to sustainable workflows powered by AWS, the company is transforming 3D CAD design and shaping the future of creativity.
Cybercriminals are launching relentless attacks. The potential for breaches and exploitation has increased as the world has become more connected, raising an urgent question: Are we winning the fight against cybercriminals, or are we just sinking deeper into their grasp?
Black Hat Europe returns to London with more than 45 keynotes and briefings tackling everything from bootloader bugs and flaws in artificial intelligence and large language model tools, to disrupting fake online brokerages and remotely hacking Volkswagen entertainment systems to track vehicles.
President-elect Donald Trump's appointment of former PayPal executive David Sacks to serve as the inaugural White House czar for artificial intelligence and cryptocurrency is already raising significant concerns about potential conflicts of interest and market favoritism.
In the latest weekly update, ISMG editors discussed China outpacing the U.S. in critical technology research investments, why all 10 RSA Conference 2025 Sandbox Innovation finalists will receive a $5 million investment, and how artificial intelligence dominated the AWS re:Invent 2024 conference.
Revocation events, decreasing certificate lifetimes, new trends in software trust - 2024 was a busy year for certificate lifecycle management. And 2025 looks just as frenetic says DigiCert's Dean Coclin, who shares insights on trends to watch and automated solutions to investigate in the New Year.
Three of the world's largest pure-play cybersecurity vendors recently reported earnings, grappling with SIEM and firewall displacement opportunities along with rebounding from a massive outage. Palo Alto Networks continues to reap the benefits of buying IBM's QRadar SaaS business.
Artificial intelligence: What's it good for? Per the old song about war, the answer isn't "absolutely nothing," but so far it also isn't "absolutely everything." New findings pinpoint where generative AI and deepfakes are hot - fraud - and where they're not - election interference
Adversaries are exploiting legitimate processes in endpoint and cloud environments, bypassing detection by leveraging native systems. In the cloud, misconfigured environments and stolen credentials are driving the threat landscape, said Terrance DeJesus, senior security research engineer, Elastic.
This week, Solana npm package attack, a Brazilian banking giant entered crypto trading and a Nebraska man pleaded guilty to cryptojacking. Australia tightened rules for crypto businesses and crypto losses dropped in 2024 and DMM Bitcoin will cease operations.
Law enforcement investigating murder of Brian Thompson, CEO of UnitedHealthcare, are examining potential motives. But shell casings reportedly found at the crime scene spotlight one of the top motives speculated - anger over the company's alleged denial of coverage practices. Where does AI fit in?
CEO Anand Eswaran explains how Veeam's $2 billion secondary offering strengthens its financial position as the data resilience vendor prepares for an initial public offering. He discusses the company’s commitment to innovation and strategic pacts with Splunk, CrowdStrike and Palo Alto Networks.
The U.S. Department of Homeland Security is reportedly expanding its use of emerging surveillance tools, including drones and artificial intelligence, without proper safeguards as experts warn of potential privacy violations and risks involving facial recognition and third-party data usage.
Nation-state attackers pose a growing cybersecurity threat driven by specific geopolitical or economic objectives. These actors often target organizations with valuable data, using advanced techniques such as reconnaissance, said Ryan Roobian, global solutions architect, Google Cloud.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.