As Russia's invasion of Ukraine continues, it's notable that Ukraine's government - and much of the country - has remained connected to the internet. That's happening despite fierce Russian cyberattacks, says cybersecurity expert Mikko Hypponen, who highlights Ukraine's defensive mojo.
Several major email breaches reported by healthcare entities in recent days and weeks have affected the health data of nearly 300,000 individuals. Experts say the incidents highlight the ongoing challenges many organization face involving phishing attacks and similar email compromises.
Personal data allegedly obtained during a cyberattack using BlackCat ransomware was published on a typosquatted open internet website. This new extortion technique shows an escalation by ransomware groups in their willingness to use personal data to bludgeon victims into paying extortion money.
CISO Eric Sanchez of Kyowa Kirin North America discusses the nuances and challenges of building a security program at an international company. He shares strategies for managing the people, operations and technology and explains why strong interpersonal and crisis management skills are a must.
Mandiant has taken advantage of the opportunity to become truly vendor-agnostic since selling its FireEye products business to Symphony Technology Group in October, and it has pursued integrations with leading endpoint security vendors, says executive vice president and CTO Marshall Heilman.
An Arizona medical center that suffered a ransomware attack in April has begun notifying 700,000 individuals of a data breach compromising sensitive medical and personal information. The incident is among the latest major health data breaches involving ransomware.
Every second of downtime after a ransomware attack costs businesses in industries such as retail and e-commerce large sums of cash. Business continuity is therefore vital even before determining whether ransomed data or systems can be recovered, says VMware Security General Manager Kal De.
Former Rockwell Automation CISO Dawn Cappelli discusses the mission of the new Dragos OT-CERT - a cybersecurity resource designed to help industrial asset owners and operators build their OT cybersecurity programs, improve their security postures and reduce OT risk - and her role as its director.
Security leaders shouldn't ignore current geopolitical tensions, which are going to infiltrate into private sectors, says Troy Leach of the Cloud Security Alliance. And John Kindervag of ON2IT Cybersecurity says - for that reason - organizations need to stop being cheap on cybersecurity.
More organizations are using attack path management to simulate how attackers will likely break into any given environment, to help IT and security teams better allocate resources and prioritize remediation efforts to optimize their defenses, says Paul Giorgi of XM Cyber.
Top Russian diplomat Andrei Krutskikh is pressuring the U.S. to back down in cyberspace after the director of U.S. Cyber Command, Army Gen. Paul Nakasone, acknowledged America has conducted a "full spectrum" of virtual operations in support of Ukraine.
The COVID-19 pandemic has accelerated the migration to the cloud for many organizations, and there have also been challenges associated with securing hybrid or multi-cloud environments, according to Omdia Senior Principal Analyst Fernando Montenegro.
Crum & Forster CISO Chris Holden has helped organizations respond to many breaches over the years, and through this experience he has developed an excellent sense of who companies should call first and have on their response team if they suspect that a security incident has taken place.
While ransomware, third-party risk, phishing scams and insiders continue as the top threats facing healthcare and public health entities, the sector overall is becoming better prepared to deal with these issues than it was just a few years ago, says Denise Anderson, president and CEO of H-ISAC.
Customers, channel partners and technology partners are dealing with a broad range of security concerns spanning the gamut from the sophistication of the threat landscape to the skills shortage. John Maddison, Fortinet's CMO and EVP, products breaks down the most urgent priorities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.