A delay in finalizing enterprise deals and a shorter average contract duration have forced Fortinet to lower its sales forecast going forward. The Silicon Valley-based platform security vendor said average contract length shortened from 29.5 months to 28 months in the fiscal quarter ended June 30.
Ten Eleven Ventures' Alex Doll sees privacy and device management as the hottest areas for security startups and cloud companies as "coming from behind." Advancements in privacy-enhanced technologies have allowed for searchable encryption, meaning that entire databases can be locked down.
New CEO Scott Harrell wants Infoblox to evolve from classic networking DNS management to bringing networking and security together in ways that optimize protection and efficiency. DNS serves as a building block for security since it is universal across large client devices and small mobile phones.
A contractor that provides claims processing and other services says several of its community health plan customers - including 1.7 million members of the Oregon Health Plan - are victims of the zero-day MOVEit vulnerability, which has affected more than 500 organizations worldwide.
TikTok will know within a month the outcome of an Irish investigation into whether the short-form video app violated the privacy of underage users. The investigation stalled after other European national privacy enforcers raised objections to the Irish Data Protection Commission's draft decision.
How much of a risk do hacktivists pose? Hacktivism's heyday was arguably a decade ago. While activists do keep using chaotic online attacks to loudly promote their cause, they're tough to distinguish from fake operations run by governments, including Russia and Iran.
Real-time protection against API attacks is nonnegotiable for the protection of any web application or digital service that relies on application programming interfaces. Here are some of the most common types of API attacks and strategies for protecting against them in real time.
Public details have been scant so far from two medical care providers about recent major hacks that compromised the personal information of an unconfirmed number of patients. But that hasn't stopped the push by class action attorneys, who are already filing lawsuits.
A multistage malware campaign is targeting industrial organizations in Eastern Europe with the objective of pilfering valuable intellectual property, including data from air-gapped systems. Researchers at Kaspersky identified two campaigns it has attributed to the Beijing-aligned APT31 group.
According to Expel's Q1 2023 Quarterly Threat Report, criminals are exploiting 1- to 2-year-old vulnerabilities. This suggests organizations don’t know which vulnerabilities pose the biggest threats to their environments, said Andrew Hoyt, Expel's director of solution architecture.
Atlanta-based trust intelligence firm OneTrust has balanced growth and profitability and now plans to use its $150 million funding round to boost its financial controls and processes and recruit a majority independent board to prepare for an eventual initial public offering, said CEO Kabir Barday.
As more organizations undergo resource and cost pressures, 86% of managed security services customers are deciding to consolidate security tools and outsource their security requirements, according to the OpenText Cybersecurity 2023 Global Managed Security Survey.
A Tennessee-based cardiac care clinic is notifying more than 170,000 patients and others that hackers may have stolen their sensitive personal and medical information in a cyberattack detected in April. The Karakurt cybercrime group claimed credit for the hack a month later.
Human Factor Security expert Robin Lennon Bylenga advised that in building an internal threat management program, it is imperative to not send mixed messages to the broader workforce. It's wise to conduct an assessment of human risk - not just IT risk, she said.
Companies are increasingly concerned about the security of applications built on open source components, especially when they’re involved in mergers and acquisitions. Just like copyright for works of art, each piece of open source software has a license that states legally binding conditions for its use. Licenses...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.