The Five Eyes alliance of cybersecurity authorities from the U.S., U.K., Australia, New Zealand and Canada issued a warning to managed service providers about targeted attacks, advising MSP customers on how to protect sensitive data and reassess their security posture and contractual agreements.
In the latest "Troublemaker CISO" post, security director Ian Keller discusses the issue of supply chain security and whether you should disclose information about your supply chain to companies as part of the effort to secure it. His conclusion: Build your defenses and trust no one.
Organizations are seeking new, more efficient ways to deliver secure, flexible solutions to their employees, partners and customers. This often means that the focus is no longer with the datacenter, but extends to the public cloud and edge where VPN is being replaced with a SASE approach. With the internet becoming...
A recent ransomware attack disclosed by a medication management systems provider is the latest reminder of persistent cybersecurity threats and risks facing healthcare supply chain and related vendors, as well as their customers. What's at stake?
Viasat's satellite communications suffered an outage an hour before the Russian invasion of Ukraine began on Feb. 24. The company said it was a cyberattack, but did not identify the attacker. The U.S., U.K., EU and Ukraine have now attributed this attack to Russia.
As the Russia-Ukraine war continues, what cybersecurity lessons should be learned? At the CyberUK conference in Wales, cybersecurity czars focused on surprises - including low online attack volume and the role of hacktivists - and lauded Ukraine's cyber resilience, honed by years of stress testing.
Russia's use of wiper malware, DDoS attacks and targeted disinformation show it no longer depends on traditional methods in its war with Ukraine. John Walker, a professor and counterintelligence expert, says organizations need to be "more realistic" about how they handle cyberattacks.
A hacking group called Lapsus$ caused major headaches for identity vendor Okta in March when it dropped incriminating but misleading screenshots of a security breach. Brett Winterford of Okta breaks down what happened and discusses why visibility into third-party support operations is important.
There has been plenty of discussion about rolling out zero trust architecture to protect information technology. But what about operational technology? Samuel Hill of Claroty addresses the unique needs - and challenges - of applying zero trust in the OT environment.
In this interview with Information Security Media...
Even in the best of times, chief information security officers (CISOs) and their teams face numerous challenges in protecting the brand, the business and
sensitive data against ever-changing threats—all with finite and constrained resources. Today, those challenges are more extreme than ever. In a rapidly
changing...
As organizations move to the cloud, adapt to remote work, and cope with the Great Resignation, tracking data sprawl and identifying risk across the enterprise becomes an impossible task.
Collaborative apps, data democratization, and corporate/personal use apps means data is constantly spreading and often...
Medical device cybersecurity is again getting attention from Congress, with yet another bill proposing to require manufacturers to address product life cycle cybersecurity concerns in their premarket submissions to the Food and Drug Administration.
IoT, cloud migrations, endpoint proliferation, hybrid workplaces - how are organizations in the pharmaceutical industry adapting to this new threat landscape? Troy Ament and Aidan Walden of Fortinet discuss the cybersecurity gaps specific to SAP deployments and how to fill them.
The massive leak of internal communications from the Conti ransomware group has highlighted the extent to which cybercrime syndicates regularly beg, borrow, steal or sometimes even partner or collaborate, all in pursuit of increasing their illicit profits.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.