The American Hospital Association and Health Information Sharing and Analysis Center are urging the healthcare sector to step up its supply chain security and resilience as disruptive cyberattacks target critical suppliers, including last week's attack on a Florida-based blood donation center.
BlueVoyant's Cyber Defense Platform combines proactive and reactive security measures with internal and external capabilities. CEO Jim Rosenthal explains how this comprehensive approach allows clients to manage cyber risks effectively and achieve a desired state of cyber defense readiness.
Small and medium-sized businesses are vulnerable to cyberthreats, often due to insufficient investment in security measures. Joe Levy, CEO of Sophos, shares insights on enhancing SMB cybersecurity outcomes, with a focus on combating ransomware and protecting vital supply chains.
Staying ahead of cyber threats requires more than just reactive measures—it demands a proactive approach informed by reliable data and robust analysis.
A supply chain security firm led by an ex-Google Cloud engineer closed a Series C round to assist AI workloads and expand its open-source software catalog. Chainguard raised $140 million just eight months after completing a $61 million Series B funding round, tripling its valuation to $1.12 billion.
It's been nearly 18 months since ChatGPT paved the way for rapid generative AI adoption, but enterprises are just beginning to implement basic cybersecurity strategies and use blocking controls, DLP tools and live coaching to mitigate gen AI risks, according to security firm Netskope.
Ransomware remains a major threat to energy, oil/gas and utilities organizations of all sizes around the globe. Our 2024 state of ransomware report reveals that the median recovery costs for two critical infrastructure sectors - energy and water - quadrupled to $3 million over the past year.
A judge Thursday dismissed most of the claims federal regulators made against SolarWinds related to allegedly misleading investors about the company's cybersecurity practices and risks. The SEC can proceed only with claims related to the security statement issued by SolarWinds before the 2020 hack.
Healthcare groups should consider several key points about a recent Texas federal court ruling and its impact on the use of online tracker technology on the healthcare websites of HIPAA-regulated organizations, said privacy attorney Iliana Peters of the law firm Polsinelli.
What will it take for victims of ransomware, extortion and other types of cybercrime to stop directly funding their attackers? The latest breached business to pay a ransom to its attackers appears to be AT&T, which reportedly paid Shiny Hunters over $350,000 for a promise to delete stolen data.
Hacks and vendor incidents continue to dominate major health data breach trends in 2024, but a handful of large incidents involving "unauthorized access or disclosure" also top the list of major health data breaches reported to federal regulators so far this year. How are trends shifting?
CISOs Shefali Mookencherry and Kenneth Townsend examine the implications of AI for copyright infringement and consent. They discuss the need for clear governance and responsible use of data and the evolving landscape of AI privacy issues in both the healthcare and non-healthcare sectors.
The U.S. Cybersecurity and Infrastructure Security Agency provided details on Monday about a framework it's currently developing to measure and evaluate the trustworthiness of open-source software security, including funding a new open-source tool to make the framework scalable and implementable.
Accenture's Daniel Kendzior and Palo Alto Networks' Rich Campagna discuss the need to implement robust AI security measures. They highlight the importance of controlling third-party AI access, safeguarding AI infrastructure and evolving cybersecurity strategies to counter AI-driven attacks.
HealthEquity, which administers healthcare benefits plans for employers, has notified the U.S. Securities and Exchange Commission of a data exfiltration breach involving the compromised credentials of a third-party vendor. The incident did not disrupt IT systems or processes.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.