An investigation at the U.S. Treasury Department has found that it suffered a "significant" breach as a result of the SolarWinds Orion supply chain attack, a top Democrat on the Senate Finance Committee reports. Meanwhile President-elect Joe Biden said of the attack: "I promise you, there will be a response."
Several tech giants, including Microsoft, Google, Cisco and VMware, have filed a brief backing Facebook's lawsuit against Israel-based spyware firm NSO Group, which has been accused of hacking into Facebook-owned WhatsApp's instant messaging app to enable spying by the company's clients.
Europol, the EU's law enforcement intelligence agency, and the European Commission are launching a new decryption platform to help law enforcement agencies decrypt data that has been obtained as part of a criminal investigation, a move seen as an alternative to weakening encryption.
The Identity Governance and Administration (IGA) market is continuing to evolve through more integrated Identity Provisioning and Access Governance solutions that are now increasingly aided by intelligent features. This Leadership Compass will give an overview and insights into the IGA market, providing you a...
For some, 'observability' is just a hollow rebranding of 'monitoring', for others it's monitoring on steroids. But what if we told you observability is the new way to find out why - not just if - your distributed system or application isn't working as expected? Today we see that traditional monitoring approaches can...
Intel and Cisco are among the thousands of SolarWinds Orion customers that were running a Trojanized version of the security software. FireEye, together with Microsoft and GoDaddy, have devised a "kill switch" to disrupt attackers' ability to access the malware on at least some infected systems.
In 2021, security information event management (SIEM) solutions will be far more than an information platform, expanding to include compliance reporting and logs from firewalls and other devices, as well as User and Entity Behavior Analytics (UEBA) - now considered an essential capability by Gartner. On top of that,...
Recent disclosures about security issues pertaining to certain medical devices as well as storage devices used in healthcare serve as reminders of the potential risks to patients that must be mitigated.
An evolving workplace, greater reliance on IoT and the cloud, and already we have seen the new face of supply chain attacks. This is the backdrop for 2021, and Imperva's Brian Anderson offers insights into the cyber-attack outlook.
Point-of-sale device manufacturers Verifone and Ingenico have released fixes for flaws in some of their devices after researchers found the vulnerabilities could have enabled attackers to steal payment card data, clone cards or install malware.
MITRE ATT&CK for ICS provides a framework for security managers to assess and improve their security controls for industrial control systems (ICS) and operational technology (OT) environments.
The Armis agentless device security platform is the fastest, most efficient way to find and stop cyber attacks in ICS and OT...
The use of the Internet of Things (IoT) devices has skyrocketed in our businesses, factories, and hospitals. The Mirai, Hajime, and Persirai botnets demonstrated how this explosive growth has created a new attack surface, already exploited by cybercriminals. Businesses must now address this new threat landscape to...
The healthcare industry is going through a huge digital transformation with the Internet of Things (IoT). New connected devices bring the promise of improved patient care, improved efficiency, and reduced costs — offering a new digital relationship between the patient and the caregiver. But many of these new...
The Zero Trust security model created by Forrester has become a mainstay of security approaches. But traditional Zero Trust controls largely overlook unmanaged and IoT devices, leaving the enterprise at risk.
Read this white paper and learn:
How existing Zero Trust security tools are not designed for unmanaged...
Hackers are targeting thousands of vulnerable MySQL servers around the world, using ransomware to exfiltrate data from organizations and then demanding payment, according to Guardicore Labs. The attackers are also selling access to over 250,000 stolen databases.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.