The Federal Trade Commission is warning Amazon and One Medical to abide by their promises to protect consumers' data privacy. The statement comes in the wake of Amazon's $3.9 billion purchase of the primary healthcare on-site and virtual services provider.
With signs pointing to a global economic downturn, cybersecurity organizations are already thinking about managing budgets and doing more than less. Four CISOs share a wide range of belt-tightening tips, from putting the squeeze on your vendors and suppliers to training and hiring from within.
CyberMaxx has landed the former CEO of cloud security vendor Threat Stack to bring offensive and defensive cybersecurity services together on one platform. The Nashville-based firm has tasked Brian Ahern with creating managed detection and response bundles with offensive and defensive capabilities.
A lack of visibility makes it nearly impossible to protect an organization against attack. If you can't see what's lurking in the dark corners of your environment, all you can do is react instead of actively identifying and mitigating risks. But some technologies can help with threat visibility.
The Australian government says it will centralize its approach to securing federal agencies by appointing a coordinator to head the new National Office for Cyber Security within the Department of Home Affairs. The appointment comes after back-to-back major data breaches.
With the U.S. COVID-19 public health emergency expected to end in May, the government is set to scrutinize telehealth providers for HIPAA violations. That’s why healthcare firms should review their telehealth platforms and vendors, says privacy attorney Adam Greene of Davis Wright Tremaine.
A top U.S. government official urged industry to become more conscientious over cybersecurity by preventing vulnerabilities from accumulating before products ship. CISA head Jen Easterly called for a more assertive role for government and an industrywide shift to memory-safe programming languages.
The European Commission has directed employees to remove the ByteDance-owned, short-form video app TikTok from their phones and corporate devices, citing security concerns. The decision follows similar bans in the U.S. and other countries, driven by fears of Chinese hacking and influence.
Automaker Tesla revised settings for its in-built cameras after a probe by the Dutch data privacy agency found its default settings enabled illegal recording and retention of data. "Teslas parked on the street were often filming everyone who came near the vehicle," DPA board member Katja Mur said.
Intel 471 has promoted second-in-command Jason Passwaters to CEO and tasked him with onboarding less-mature security organizations for narrower use cases. The company plans to land more threat intelligence customers by focusing on areas such as vulnerability management and patch prioritization.
In the latest weekly update, John Kindervag, creator of zero trust and senior vice president of cybersecurity strategy at ON2IT, joins ISMG editors to discuss the top zero trust storylines of the year, the impact of ChatGPT on the cybersecurity industry and how to tackle MFA bypass attacks.
Cybercrime experts have long urged victims to never pay a ransom in return for any promise an attacker makes to delete stolen data. That's because, as a recent case highlights, whatever extortionists might promise, stolen personal data is lucrative, and it often gets sold six ways from Sunday.
The Los Angeles Unified School District confirmed that records containing mental health data and other sensitive information of about 2,000 students, including 60 current pupils, were among data leaked in a ransomware attack last fall by Russian hacking group Vice Society.
The European Commission is preparing a proposal mandating more cooperation among national government agencies charged with enforcing the General Data Protection Regulation. Nationally driven enforcement of the regulation has emerged as a sore point for some during the GDPR's first half decade.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.