With Ukraine having called on the world to join its "IT Army" and help it hack Russia and ally Belarus, what could possibly go wrong? For starters, launching distributed denial-of-service attacks - at least from outside Ukraine - remains illegal and risks triggering an escalation by Moscow.
U.S. President Joe Biden this week issued a cryptocurrency executive order that addresses consumer protection, national security and financial stability. Ari Redbord, former senior adviser at the U.S. Treasury, calls this order "a clarion call" for crypto regulation and shares his initial reaction.
The ISMG Security Report features an analysis of the U.S. government's request for billions of dollars in tech aid to curb the global impact of the Kremlin's campaign in Ukraine. It also examines Biden's cryptocurrency executive order and why breached organizations often don't share full details.
Healthcare entities and other organizations frequently skimp on application security, which is a critical area, and this often results in data breaches, security incidents and other mishaps, says former Blue Cross of Idaho CISO Sandy Dunn, who is now CIO and CISO of security firm BreachQuest.
As expected, President Joe Biden on Wednesday signed an executive order on cryptocurrency that tackles consumer protection, financial stability, national security and climate risks. The administration calls it the first whole-of-government strategy to rein in cryptocurrencies.
In an excerpt from his book "CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide," Peter Gregory discusses choosing the fifth option in risk management, which is ignoring the risk. He warns of the problems that choice can cause.
President Joe Biden is expected to outline a whole-of-government approach to reining in cryptocurrencies, which have been criticized for lax cybersecurity measures. Media reports say the administration will announce an executive order on crypto this week, to align the U.S. with global allies.
Federal authorities are warning about seven vulnerabilities affecting a software agent used to remotely manage an array of medical devices and other connected gear. If exploited, the vulnerabilities could enable hackers to gain full control of the affected devices or alter their configurations.
As Western cybersecurity officials warn that Russia's Ukraine invasion poses an elevated cybersecurity risk to all, kudos to Cloudflare, CrowdStrike and Ping Identity for offering free endpoint security and other defenses to the healthcare sector and power sectors, for at least four months.
Google will buy cybersecurity firm Mandiant for $5.4 billion, an acquisition Google says will give it new capabilities to respond to cybersecurity threats and bolster its cloud platform. Mandiant will be folded into Google's Cloud Platform.
Guidance from the Healthcare Sector Coordinating Council provides healthcare delivery organizations and vendors with recommendations for including cybersecurity in contracts pertaining to the procurement of medical device products and related services.
U.S. officials say that while it would be nearly impossible for Russia to "flip the switch" and convert to cryptocurrency to stabilize its sanctioned economy, they caution that Russian elites and entities may yet try to skirt the measures by transferring and obfuscating funds across the blockchain.
Ransomware gang Lapsus$ has leaked credentials of 71,000 Nvidia employees on a Telegram page, Information Security Media Group has found. The data was stolen in a breach, data breach notification service Have I Been Pwned confirms.
Critical cybersecurity gaps in smart infusion pumps have put the data and care of hundreds of patients at risk, according to researchers at Unit 42 of cybersecurity firm Palo Alto Networks. They say that 75% of the 200,000 smart infusion pump networks they scanned contained known security gaps.
As Russia's invasion of Ukraine continues, what should global CISOs and security teams do to ensure that their organizations stay protected? Beyond following cybersecurity agencies' guidance, experts offer advice on how to brief the board of directors, appeal for resources, support teams and more.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.