Applying international laws used for armed conflicts to the cyber domain remains elusive because of a lack of precedent and poor visibility in cyberspace. This uncertainty and a failure to establish rules means cyber law hasn't grown as other legal fields have, a defense expert says.
The Russian cybercrime syndicate Evil Corp constitutes a significant threat to the healthcare sector due to the gang's powerful malware and ransomware and its deep ties to various hacking groups, the Department of Health and Human Services' Health Sector Cybersecurity Coordination Center warns.
As budgets tighten in anticipation of economic hardships, cybersecurity threats only continue to grow. Bill Bernard of Deepwatch advises security leaders to consider how senior management and the board view cybersecurity and then adjust how you prioritize people, technology and managed services.
Montenegro continues to try and restore government infrastructure disrupted in a recent cyberattack. While a government official said Moscow was likely to blame, the Cuba ransomware gang has since taken credit - at least for an attack on the Balkan country's Parliament, including the theft of data.
The U.S. Cybersecurity and Infrastructure Security Agency has worked closely with the energy and financial sectors in recent months to prevent cyber fallout from the Russia-Ukraine war. CISA Chief of Staff Kiersten Todt says information sharing is crucial for the critical infrastructure industries.
A new (ISC)² member pulse survey on remote work policies in 2022 found that cybersecurity professionals who get to choose where to work are the most satisfied, while those being forced back into the office are the least satisfied. The association advises firms to discuss options with employees.
Last year, Rowland Johnson took on the role of president of CREST, the international not-for-profit membership body representing the global cybersecurity industry. Over the past 12 months, he says, he's taken time to "pause and reflect" and "define a new vision and mission" for CREST.
With VMware's updated network virtualization platform, users can launch an entire workload with a single click without having to open a ticket. VMware says the platform enhances east-west network traffic security to stop attackers' lateral movement, simplifies multi-cloud security and lowers costs.
Chinese intelligence is conducting cyberespionage campaigns targeting corporations involved with energy extraction in the South China Sea, researchers say. Proofpoint and PwC conclude with moderate confidence the campaign is the work of the threat actor known as TA423 or Red Ladon.
Alex Holden, CISO and founder of the cyber intelligence company Hold Security, was preparing to open an office in Ukraine when Russia invaded in February. He went ahead with his plan anyway. In this video interview with Information Security Media Group, he tells why he did it.
With the increase in remote workers and proliferation of uncontrolled devices, your IT team has been migrating applications to the cloud along with building cloud-native applications to support the speed needed by the business.
They’re necessary contributors to the business ecosystem, but there’s risk associated with third-party remote access, including bad actors lurking around every access point.
An apparent ransomware incident involving a printing and mailing vendor affects more than double the number of people originally reported as being affected, and the total now nearly reaches 2.7 million individuals. Why are so many vendors reporting huge breaches?
The U.S. Federal Trade Commission filed a lawsuit against Idaho-based data broker Kochava Inc., alleging the company collects and sells sensitive geolocation data, including information about visits to reproductive health clinics. Kochava's actions are an unfair marketplace practice, the FTC says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.