Modern enterprises must stay proactive to meet customer needs and protect all data, users and apps no matter where they're located. The onslaught of new apps and the explosion of IoT devices make the attack surface challenging to manage.
Traditional branches don't accommodate the type of security architecture...
In the latest weekly update, Troy Leach, CSO at Cloud Security Alliance, joins three editors at ISMG to discuss important cybersecurity issues, including how generative AI is enhancing multi-cloud security, AI's influence on authentication processes, and the state of zero trust and IoT security.
At a time when financial services CISOs and other security leaders are responsible for complying with increasing data privacy and security mandates, leaving any corner of your environment exposed has the potential to turn security risk into business risk.
Download this whitepaper to learn;
6 benefits to...
In an extremely competitive and fast-growing field of more than 70 industry participants with revenue greater than $1 million, Frost & Sullivan independently plotted 17 leaders in growth and innovation in the XDR space in this Frost Radar analysis.
The 2023 Frost Radar for XDR was published on August 22, 2023, and...
Globally, the average data breach costs firms of all kinds $4.45 million (a breach in the U.S. costs
$9.4 million). Damage to your brand and reputation could make that loss look like peanuts.
Public-facing endpoints and certain back-end systems are often overlooked by traditional
negative security model solutions...
Application Control For Dummies, Carbon Black Special Edition, is primarily a discussion of application control technologies. The book first looks at the history of application control along with a more thorough look at the threat landscape.
Download this eBook to learn how to:
Protect air-gapped...
Thermostats sold across the globe by German multinational engineering company Bosch contained a flaw allowing hackers to cut power to the heating system and override the firmware, warn researchers from cybersecurity firm Bitdefender. Bosch pushed an over-the-air update in October.
Remote third-party access is a particular problem in OT environments compared to IT environments, since OT often uses older legacy systems with longer replacement cycles. Nicolas Moskal provides a demonstration of practical solutions to overcome these challenges.
A new cryptomining campaign uses a quirkily customized Mirai botnet to spread cryptomining malware designed to hide the digital wallet that collects the ill-gotten gains. Security researchers at Akamai dubbed the Mirai variation NoaBot when it first appeared in early 2023.
Researchers found a path traversal vulnerability in Kyocera's Device Manager product, which is used for overseeing large printer fleets in mid- to large-sized enterprises. Attackers could exploit the flaw to obtain NTLM hashes by changing the location of a backup database.
Ivanti issued an urgent alert to users of its endpoint security product to patch a critical vulnerability that exposes systems to potential exploitation by unauthorized attackers. The SQL injection vulnerability tracked as CVE-2023-39336 is in all supported versions of Ivanti Endpoint Manager.
The Russian military hacked into surveillance cameras to spy on Ukrainian air defenses and Kyiv's critical infrastructure during the missile and drone strikes on the capital city Tuesday. Ukraine has blocked and dismantled the cameras, and it urged users to stop sharing security camera feeds online.
As we bid farewell to 2023, Philip Reitinger, president and CEO of the Global Cyber Alliance, reflected on the state of global cyber hygiene, shedding light on what's working, what needs improvement, and the transformative shifts necessary to achieve a cyber-secure future.
In conjunction with a new report from CyberEd.io, Information Security Media Group asked some of the industry's leading cybersecurity and privacy experts about 10 top trends to watch in 2024. Ransomware, emerging AI technology and nation-state campaigns are among the top threats.
A previously undiscovered critical exploit can allow threat actors to gain persistent, unauthorized access to Google services and connected accounts even after users have changed their passwords, cybersecurity researchers warn. They said the flaw enables hackers to manipulate the OAuth 2 protocol.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.