Security researchers at FortiGuard Labs have uncovered another DarkSide ransomware variant with destructive capabilities. But the researchers say the variant is "unrelated to the Colonial Pipeline campaign" and no longer active.
In the wake of recent attacks on supply chains and critical infrastructure, Adrian Mayers says it's time for cybersecurity to be seen as an issue of national defense, and that cybersecurity leaders throughout the private and public sectors must embrace their role to protect national interests.
How can the security and HR organizations partner to foster a better, enterprisewide culture of security? This is what Steve Luczynski and Valerie Utsey did in previous roles, and they share insights from their presentation on the topic at RSA Conference 2021.
Secure Access Service Edge - SASE - has emerged in hardly two years' time as a new cloud-enabled architecture for delivering cybersecurity to today's dispersed workforce. Mike Anderson of Netskope and Mark Eggleston of Health Partners Plans discuss the promise and potential pitfalls of SASE.
Colonial Pipeline Co.'s CEO, Joseph Blount, said Wednesday that he authorized the payment of a $4.4 million ransom just hours after the company was hit by a DarkSide ransomware attack, telling The Wall Street Journal, "It was the right thing to do for the country."
The Colonial Pipeline ransomware attack was every CISO's nightmare. And Roger Caslow of HRSD has faced a similar nightmare before. Caslow and Amit Basu of International Seaways weigh in on this recent attack, its significance and how ransomware defenses must change.
Cryptocurrency is gaining traction worldwide. But is it ready to displace the U.S. dollar as the world's reserve currency? Kathy Wang and Kenneth Geers of Very Good Security bring this topic to the RSA Conference stage and share exclusive insights in this panel discussion.
Since the supply chain attack that targeted SolarWinds was uncovered in December 2020, some members of Congress have been pushing for a nationwide data breach notification law. In a panel discussion at RSA Conference 2021, federal officials and a legal expert offered insights on what such a law might require.
Attacks against Colonial Pipeline and other organizations have put ransomware at the top of conversations about cybersecurity. Megan Stifel of the Global Cyber Alliance believes new approaches are needed now.
As more states continue to roll out their own health data-related privacy laws that do not fall under the federal regulatory umbrella of HIPAA, it is becoming more challenging for organizations to navigate the regulations, says privacy attorney Sheila Sokolowski of law firm Hintze Law PLLC.
A data security incident involving a Canada-based insurer that provides comprehensive health coverage to students studying abroad shines a light on complex international regulatory issues companies can face in the wake of a data breach.
Want to stay well-protected against emerging cybersecurity threats? Keep a close eye on the latest headlines, says BlackCloak's Chris Pierson, who recommends organizations continually refine - and practice - their incident response plan based on the latest real-life attack scenarios.
Investigators at industrial cybersecurity specialist Dragos say an employee of the water treatment plant in Oldsmar, Florida, where a cyberattack was thwarted, had visited an infected website the same day, but that apparently played no role in the security incident.
What more can be done to disrupt cybercrime operations and embolden even tough-to-reach jurisdictions to take action against suspects? Craig Jones, director of cybercrime at Interpol, describes recent disruptions - for example, of Joker's Stash - and takeaways for combating today's top online threats.
Are there better ways to characterize, assess and handle big, bad bugs to help organizations better prioritize remediating them? Allan Liska, an intelligence analyst at Recorded Future, discusses better ways to focus vulnerability hunting.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.