The Federal Reserve's FedNow Service will launch in July this year. Many banks, including community banks, will be able to leverage FedNow as an instant payment platform. How can these banks prepare for faster payments, and what security controls should they consider adding?
Healthcare entities need to think more strategically about managing risk by implementing a robust cybersecurity framework such as the National Institute of Standards and Technology's CSF, said Bob Bastani, cybersecurity adviser at the Department of Health and Human Services.
Supply chain risk has become more critical in the post-pandemic world, and that means you need to ask "much more focused, targeted questions" about your partners, according to Sawan Joshi, director of information security at Cervest, a climate intelligence startup.
A cyber risk quantification startup backed by ex-Cisco CEO John Chambers has raised $50 million to apply ML technology and build more API adapters. The money will allow Safe Security to capitalize on generative AI to help nontechnical leaders better understand their organizations' security postures.
New resources released Monday from a high-profile federal advisory group provide insights into the state of healthcare sector preparedness and best practices for dealing with evolving cyberthreats, according to Erik Decker, CISO of Intermountain Healthcare and co-chair of the task force.
Improving IT operations can be a challenging task for organizations to handle.
With the ever-changing technology landscape, there is a continuous demand to keep systems updated and secure. However, meeting these demands can prove challenging. As organizations grow and their IT infrastructure becomes more...
As cyber threats continue to evolve, IT and security managers across North America must stay informed and take proactive measures to keep their organizations secure. Our industry experts have unique insights into these attacks and can provide real-life examples across all industries to help you stay one step ahead of...
SaaS applications are typical in the modern hybrid workforce, but their adoption requires organizations to carry out a proper risk assessment of each third party SaaS application accessing the data in these environments.
Spin.AI released new findings analyzing risk from third-party SaaS applications and browser...
A slew of top tech executives and artificial intelligence researchers called for a minimum half-year pause on advanced artificial intelligence systems. Tech giants already have fallen into a race to see who can be the quickest to incorporate AI into their products.
For many organizations, the massive shift to hybrid work brought on many unique challenges for an organization that is migrating to the cloud. There are some questions that have to be considered by that organization when aiming to store their data in the cloud – how is it being protected and who is responsible for...
In times of economic uncertainty, security teams are tasked to do more, but with fewer resources, making it more difficult to mitigate cyberthreats. The status quo of standard tools & methods make it overly complex and inefficient when it comes to the use of both money and human capital (of which there is a growing...
The European Central Bank will conduct cyber stress tests to determine banks' resilience against cyberattacks. The tests, which will receive a "significant amount of time and resources," are set to be completed by mid-2024, said Andrea Enria, ECB's top official for oversight.
Identity verification and e-signature firm OneSpan is working with investment bank Evercore on a sale process that could attract interest from other businesses and private equity firms, Reuters reported. This follows five publicly traded cyber vendors agreeing to go private since the start of 2022.
Spoiler alert: In 2022, audits found open source in 100% of our customer engagements.
Since open source usages are now so pervasive, companies are increasingly concerned about the security of applications built on the foundation of open source components. Consequently, open source security and license compliance...
In a post-pandemic world the new norm means that organizations have shifted to hybrid / remote work, taking your organization’s most important entities outside of the network: your data, applications, and users. As a result, traditional perimeter-based tools like network firewalls and VPNs are proving more and more...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.