Coro completed a $100 million Series D round to expand its global footprint and enhance its channel program. The funding aims to address the needs of Europe's expansive midmarket business community through Coro's all-in-one modular cybersecurity platform.
The Office of Management and Budget issued the first-ever governmentwide guidance for mitigating risks associated with the federal use of artificial intelligence, including specific actions agencies must complete within a year to help ensure the responsible use of emerging tools and technologies.
According to a survey done by Forrester Consulting on IT decision makers in Australia and New Zealand, 46% of the organizations are interested in adopting the ZTNA strategy.
Zero Trust Network Access (ZTNA) is a foundational enabler in todays’ digital environment and this webinar delves deep into the strategies...
The Change Healthcare attack - the most disruptive cyber incident to ever hit the U.S. healthcare ecosystem - spotlights the risks that come from relying on a handful of major suppliers, said leaders of the Health Information Sharing and Analysis Center.
Fresh zero-day vulnerabilities continue to be actively exploited in the wild by attackers, often for surveillance and espionage purposes, according to the latest annual review of in-the-wild exploits published by Google. In 2023, 97 new zero-days came to light, up from 62 in 2022.
Palo Alto Networks Senior Vice President Anand Oswal details how Talon's browser technology secures unmanaged devices, enhances SASE capabilities and facilitates hybrid work. The platform security behemoth bought Tel Aviv, Israel-based based Talon in December for $458.6 million.
Proposed federal sticks and carrots to incentivize the health sector to implement stronger cybersecurity standards are already meeting opposition from some industry groups that say financial help is welcome but payment penalties for perceived laggards likely will do more harm than good.
‘Next-generation’ GRC professionals now play a pivotal role in guiding executive decisions, helping the Board understand and set cybersecurity risk tolerance levels, and working with the frontline business to decide which risks should be remediated, mitigated, or even accepted. This business-focused approach...
Artificial intelligence (AI) has huge potential to transform healthcare for the better, but given AI’s unbridled adoption across the industry in just the past year alone, healthcare organizations must begin to actively manage the risks that AI presents to cybersecurity and patient safety. Based on conversations with...
The 2024 Healthcare Cybersecurity Benchmarking Study — a collaboration between Censinet, KLAS, the American Hospital Association, Health-ISAC, and the Healthcare and Public Health Sector Coordinating Council — provides an overview on the state of healthcare cybersecurity preparedness, maturity, and resiliency. It...
As ransomware continues to threaten care operations at hospitals and health systems across the country, managing enterprise cyber risk now means managing risks to patient safety. This Solution Brief provides 5 best practices for identifying, managing, and mitigating enterprise cyber risk to help health systems...
The European Commission will scrutinize Meta's pivot to a subscription model in response to a string of rulings from data protection boards limiting the social media giant's ability to legally collect user data. Europe announced a slew of investigations into American big-tech companies.
The move to cloud has uncovered a range of risks that enterprises might inadvertently overlook. Transition often highlights cloud concentration risk, which encompasses vendor, availability, business continuity and regulatory risks, said Abid Adam, group chief risk and compliance officer at Axiata.
Iran-aligned threat actor TA450, also called MuddyWater, is using fake salary, compensation and financial incentive emails to trick Israeli employees at multinational organizations into clicking malicious links, according to researchers at security firm Proofpoint.
The integration of Oxeye into GitLab’s suite marks a significant leap in the accuracy and efficiency of security scans, directly addressing the challenge of false positives in static application security testing and enhancing software security across development stages, according to GitLab.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.