To counter AI-driven fraud, LexisNexis acquired IDVerse, a London-based startup focused on document authentication and regulatory compliance. This acquisition aims to seamlessly integrate advanced tools into LexisNexis' fraud and identity platforms, enhancing global operations.
File transfer software made by Cleo Communications is under active attack and a patch meant to stymie hackers doesn't fix the flaw, say security researchers from Huntress. Hackers exploit an arbitrary file-write vulnerability along with a feature that automatically executes files.
A breach that exposed the personal information of nearly 1.6 million patients of a Puerto Rico-based clearinghouse has led to a $250,000 financial settlement with federal regulations for multiple HIPAA violations. The 2019 leak has cost Inmediata Health $2.7 million in fines and civil settlements.
An $895 billion National Defense Authorization Act features key provisions for significant investments in artificial intelligence, cybersecurity and quantum technology, including initiatives aimed at enhancing the Pentagon’s technological capabilities.
Welcome to ISMG's GovWare 2024 Compendium. GovWare, Singapore's premier cybersecurity trade event held as part of Singapore International Cyber Week, brought together a community of cybersecurity professionals, including policymakers, tech innovators and information security leaders.
A probable Chinese nation-state threat actor compromised Visual Studio Code and Microsoft Azure cloud infrastructure to target Western technology firms for espionage, security firms Tinexta Cyber and SentinelLabs said. The companies call the campaign "Operation Digital Eye."
With everything in the world lately seeming to reach end states faster - sometimes referred to as the "super cycle" or accelerationism - cybersecurity professionals must help their organizations "organize to operate," said Black Hat Europe conference founder Jeff Moss at this year's annual event.
Fried dough lovers beware: doughnut juggernaut Krispy Kreme told U.S. federal regulators Wednesday it will have ongoing operational difficulties due to a cybersecurity incident. Shops are open and consumers can place orders in person. Online ordering in some parts of the United States is down.
Historically, IT and security teams have operated in silos, creating gaps in knowledge and response. Gen AI bridges this gap through natural language interfaces, enabling better communication and understanding between departments, said Druva CTO Stephen Manley.
If you're a cybersecurity professional trying to come up with ideas for your holiday wish list (or maybe you’re a loved one trying to pick out the perfect gift), look no further! Here are some top picks that will thrill any cybersecurity practitioner.
The workforce operates in places and on systems that traditionally were not allowed. Hence, modern workforce identity solutions must operate differently to keep pace. Jared Brodsky and Kentrell Lampkin of CyberArk open up on the core elements of a modern workforce identity solution.
Financial institutions are increasingly adopting multi-cloud strategies to mitigate rising cyber risks and comply with complex regulations, according to a new report. Although the move enhances flexibility and disaster recovery, challenges remain, from implementation costs to a growing skills gap.
Citrix enhances its security for hybrid work by acquiring deviceTRUST and Strong Network. Purchasing these European startups boosts protection for VDI, DaaS and cloud development, empowering organizations to enforce zero trust principles and reduce risks across their hybrid environments.
A Massachusetts hospital is notifying 316,000 people that their information was compromised in a cyberattack discovered nearly a year ago during Christmas 2023. Cybercriminal group Money Message claimed that it stole 600 gigabytes data, posting patient and employee records on the darkweb.
Manual security workflows and fragmented tool visibility create operational inefficiencies and governance gaps, said Oriel Vaturi, co-founder and CEO of Ovalix. Real-time process monitoring and automation can help organizations optimize security operations and reduce risk.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.