The final steps in mortgage closing involve much paperwork in the presence of attorneys, title companies and loan officers. While technology is available to simplify a complex and error-prone process, resilience and trust actually make e-closing a trustworthy experience for consumers.
The speed at which we're seeing ransomware attacks has increased dramatically in the last couple of years - and it's only getting faster, warns Mary O'Brien, general manager, IBM Security. Ransomware deployment has increased from three months to four days on average.
Critical infrastructure attacks during 2022 focused primarily on Eastern Europe and Ukraine given fears of reprisal from attacking the U.S., said Optiv CEO Kevin Lynch. The amount of OT security investment needed to defend against adversaries is bigger than what many organizations can handle today.
CISOs have gone from complaining that they don't get enough time and attention from the board of directors to presenting to the board every quarter, said Zscaler CEO Jay Chaudhry. Conversations with CIOs or boards tend to focus on what architectural changes can be made to reduce business risk.
Small and midsize businesses need proactive measures to ensure security just as much as any large organization. But challenges abound for SMBs as they struggle with a smaller staff and budget constraints, making them more vulnerable to cyberattacks, said SonicWall President and CEO Bob VanKirk.
Early-stage startups interested in the implementation of artificial intelligence are often concerned about the policies surrounding AI use. While some startups are looking at automating policies, others are building platforms to test the accuracy, integrity and robustness of AI models.
Digital transformation has expanded the attack surface with cloud and SaaS applications and led to more users working outside the corporate network, said Arctic Wolf president and CEO Nick Schneider. Midmarket businesses have prioritized security spending around detection and response.
International law enforcement agencies arrested hundreds in what authorities say is the largest crackdown on illicit drugs over the dark web, also revealing that German law enforcement was behind the December 2021 disappearance of dark web drug marketplace Monopoly Market.
The definition of insider threat seems to have evolved since the hybrid workforce became the norm. More organizations are now talking about the "compromised insider." Randall Trzeciak of Software Engineering Institute said that in the last three years, insider threats have changed to insider risks.
A woman suing Lehigh Valley Health Network dropped her push for a court order requiring the medical center to pay ransomware hackers in exchange for their pledge to remove from the dark web partially naked exam room photos stolen during a hacking incident.
Generative AI has revolutionized the way people interact with chatbots. Ruby Zefo, chief privacy officer and ACG for privacy and cybersecurity at Uber Technologies, cited ChatGPT as an example of the need to conduct an "environmental scan" of both external and internal risks associated with it.
Divakar Prayaga, A.P. Moller - Maersk's director for security engineering, discusses the evolution of a CISO's role from a tech to a business partner, how it affects a firm's cybersecurity posture and how to get the best return on security technology investments amid challenging economic conditions.
As COVID-19 made remote work more prevalent, managing identity through both network and remote capabilities became a challenge for organizations. Zero trust is a big initiative for the Center for Internet Security, but applying zero trust principles to its infrastructure has not been easy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.