Third-party access management poses significant cybersecurity risks in healthcare, but continuous identity management and monitoring can help mitigate those risks, said Jim Routh, chief trust officer at Saviynt.
As quantum computing continues to evolve, cybersecurity professionals and enterprise leaders must grapple with a future where current encryption technologies - on which our entire digital infrastructure is built - may no longer be secure. What next steps must they take now?
This week, Microsoft previews its latest attempt to introduce AI-enabled Windows Recall - now with added privacy features; over 1,000 cybercrime suspects busted in Africa; regulators report "smart" device update promises often missing; and Florida IT professional caught spying for China.
An apparent Russian script kiddie is converting widespread security gaps into powerful botnets capable of launching global-scale distributed denial-of-service attacks. A threat actor with the online moniker "Matrix" is exploiting IoT vulnerabilities such as default credentials and outdated software.
The Australian government's proposed cybersecurity legislation passed both houses of the Parliament on Monday, formalizing the government's strategy to boost ransomware payment reporting, mandate basic cybersecurity standards for connected devices and enhance critical infrastructure security.
Two vulnerabilities in Mozilla products and Windows are being actively exploited by RomCom, a Kremlin-linked cybercriminal group known for targeting businesses and conducting espionage, warn security researchers from Eset. Exploiting the two flaws together enables attackers to execute arbitrary code.
New CEO Bill Welch discusses Sysdig's cloud security strategy, emphasizing AI, open-source leadership with Falco, and expansion plans to serve SMBs and midmarket businesses. He shares goals for real-time response and building a sustainable, profitable company.
Halcyon has raised $100 million in Series C funding, reaching a $1 billion valuation. The company plans to enhance its cutting-edge ransomware solutions by taking on data exfiltration, deepen ties with Dell and Cisco, and expand its market presence into Japan with a partner-driven approach.
Finalists selected for RSA Conference’s Innovation Sandbox competition will now each receive a $5 million investment from Crosspoint Capital. Managing Partner Hugh Thompson said this initiative ensures top cybersecurity startups are equipped to handle increased demand and scale effectively.
A Russian cyberespionage group hacked a Washington, D.C.-based organization focused on Ukraine by deploying a new attack technique that exploits Wi-Fi connectivity, according to new research. The "nearest neighbor attack methodology could lead to a significant broadening of targeting and attacks.
An Illinois gastroenterology practice and a California pulmonary practice are among the latest medical specialty groups targeted by cybercriminals who claim to have their patients' sensitive health information. Attacks on such specialty healthcare practices appear to be rising, some experts said.
Private equity firm Haveli has purchased a majority stake in AppViewX to scale globally, targeting automation in certificate lifecycle management and public key infrastructure. CEO Gregory Webb says the acquisition will fund international expansion and next-gen technology investments.
N-able has acquired Adlumin to unify IT operations and security operations on a single platform. CEOs John Pagliuca and Robert Johnston said the deal aims to simplify complex IT environments, improve profitability for MSPs, and deliver innovative solutions to mid-enterprise and SMB markets globally.
Which vulnerabilities need fixing first to best block nation-state and other hacking attempts? Enter the latest Five Eyes intelligence partnership list of the 15 flaws most targeted by attackers, of which 11 were zero-days. Many organizations have yet to patch them all.
Wiz acquired application security posture management startup Dazz for $450 million to provide enterprises with a unified code-to-cloud solution. CEO Merav Bahat highlights how this partnership will streamline vulnerability management and strengthen remediation capabilities for global organizations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.