Two weeks ago, Change Healthcare began notifying thousands of medical practices about a massive data breach affecting millions of patients. The healthcare software firm says it will handle breach notifications, but industry groups want to ensure the government will go along with that plan.
Generative AI offers significant potential for enhancing productivity across various organizational functions. The integration of gen AI demands meticulous oversight to mitigate errors and ensure alignment with company mission, vision and values, said Patrick Dunphy, head of cybersecurity, Omron.
The Cybersecurity and Infrastructure Security Agency is warning that a majority of assessed critical open-source projects have been developed using memory-unsafe languages, potentially exposing those initiatives to a wide range of major risks and emerging threats, according to a new report.
Hackers jumped on a new flaw in Progress Software's MOVEit managed file transfer application just hours after maker Progress Software publicly disclosed the critical flaw, which allowsattackers to bypass authentication. Customers of the Massachusetts company are no strangers to emergency patching.
Add luxury department store chain Neiman Marcus and the Los Angeles Unified School District to the list of known victims of a cybercrime that accessed accounts at cloud-based data warehousing platform Snowflake. Other victims include Santander Bank and Live Nation Entertainment's Ticketmaster.
CDK Global, a leading software and solutions providers for thousands of car dealerships across the United States and Canada, has launched investigations into consecutive cyber incidents that caused disruptions and shutdowns for several days at companies across the North Americas.
Attackers who stole terabytes of data from customers of Snowflake have been not only offering the data for sale on data leak marketplaces but also extorting some of the victims, demanding a ransom of $300,000 to $5 million each, security researchers report.
A Chinese threat actor used state-sponsored techniques to carry out a cyberespionage campaign targeting a major organization's networks after exploiting legacy technology to gain multiple footholds across the enterprise infrastructure, researchers said in a Monday blog post.
Adi Bleih and Daniel Pigeon of Cyberint discuss the evolution of cyber operations in recent conflicts, the rise of hacktivist groups, the targeting of critical infrastructure and supply chains and the need for new defense strategies.
Theresa Lanowitz, head of evangelism and research at AT&T Cybersecurity, discusses key insights from the latest cybersecurity report. Security leaders need balanced investing, more internal collaboration and better preparation for potential cyberthreats to improve enterprise security, she said.
Cybersecurity and risk management work hand in hand to bolster a company's resilience, reducing exposure to potential threats. Dave Johnson, a principal solutions architect at Expel, advises organizations to adopt a holistic approach to cybersecurity to address risks effectively.
Enterprise browsers offer corporations many advantages over traditional web browsers, from simplifying application delivery to protecting intellectual property. They offer precise control over user interactions with applications and data, said Steve Tchejeyan, president of Island.
Information Security Media Group editors are live at Infosecurity Europe Conference 2024 in London with an overview of opening-day activities and hot topics including the latest ransomware trends, software security, election security and artificial intelligence risks.
In the latest weekly update, ISMG editors discussed the implications of Kevin Mandia stepping down as Mandiant CEO; UnitedHealth Group's responsibility for a massive HIPAA breach at its subsidiary, Change Healthcare; and privacy concerns over large language models.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.