As healthcare becomes increasingly interconnected, web tracking is easy to overlook but could introduce additional risks to patient privacy. Learn about the different kinds of patient data and the seven recommendations for reducing risk to patients, beneficiaries and the organization.
The Biden administration's national cybersecurity strategy emphasizes bolstering critical infrastructure sector protections, including setting minimum security requirements and enhancing collaboration. But observers says the industry needs more resources and a better security posture to comply.
Eset researchers discovered the first in-the-wild bootkit malware, BlackLotus, bypassing security and booting up on fully up-to-date Windows 11 systems. Researchers found the Unified Extensible Firmware Interface bootkit in 2022, being sold on hacking forums for $5,000.
In the latest weekly update, four ISMG editors share highlights of ISMG's upcoming Engage Toronto event and discuss how the U.S. Supreme Court may undercut the identity theft statute and how - despite tough economic times - vendor Wiz boosted its valuation by $4 billion in 16 months.
Cybersecurity will take its place alongside chemical contaminant removal as an element the U.S. Environmental Protection Agency says public water systems must mitigate. "Cyberattacks that are targeting water systems are real and a significant threat," said an EPA official.
Zscaler has axed nearly 180 workers after more deliberation from new customers around large purchasing decisions led to reduced billings growth. The company revealed plans to cut its 5,900-person staff by roughly 3% - or about 177 positions - as it adapts to a more challenging business environment.
In the 21-month stretch from October 2020 to June 2022, a whopping 48 cybersecurity startups received 10-figure valuations as investors evaluated prospects on potential rather than performance. Now that the financial boom has gone bust, what happens to these unicorns from a different economic era?
When OrthoVA CIO, Terri Ripley, made the decision to send all non-clinical personnel to work from home in the early days of the pandemic, she knew there were risks but prioritized patient, physician, and staff safety first.
Ripley says they weren’t prepared to have the workforce safely access their systems...
Hewlett Packard Enterprise will soon offer clients single-vendor SASE after agreeing to buy a security service edge startup founded by a Symantec security researcher. HPE will combine the cloud, web and data security technology acquired from Axis Security with its SD-WAN tool from Silver Peak.
A new federal strategy to make commercial manufacturers liable for insecure software requires an attainable safe harbor policy and could be a disincentive for software manufacturers in sharing important vulnerability information with the U.S. government, according to industry observers.
Online counseling provider BetterHelp is set to come under two decades of privacy monitoring by the U.S. Federal Trade Commission after settling allegations that it violated users' privacy by sharing identifying information with social media platforms including Facebook.
The Biden administration has unveiled its new national cybersecurity strategy, detailing top challenges facing the U.S. and plans for addressing them. Goals include minimum security requirements for critical infrastructure sector organizations and liability for poor software development practices.
The COVID-19 pandemic has had a profound effect on the world. Businesses have compressed into months digitization plans that they had envisioned would take years. Employees who had been tied to one location can now work from anywhere (WFA), and that trend will persist for the foreseeable future.
Results from the ZK...
Remote work is here to stay. Traditional secure remote access solutions, like VPNs, have shown they can’t scale or provide sufficient security for employees who need access to applications on the internet, in the corporate datacenter, or in the public cloud to do their job.
This is where Zero Trust Network...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.