The need to implement zero trust at scale is growing ever more critical. In this video interview with Information Security Media Group, subject matter experts Srinivas Tummalapenta of IBM and Justin Douglas of Palo Alto discuss the guiding principles of scaling zero trust.
Bad news for ransomware groups: Experts find it's getting tougher to earn a crypto-locking payday at the expense of others. The bad guys can blame a move by law enforcement to better support victims, and more organizations having robust defenses in place, which makes them tougher to take down.
Thoma Bravo, Vista Equity Partners and rival Francisco Partners have set their sights on a new target: Sumo Logic. Each of the three private equity firms has approached the Silicon Valley-based data analytics software vendor expressing interest in a possible acquisition, The Information reports.
Pity the overworked ransomware gang - say, LockBit - that just "discovered" one of its affiliates hit Britain's postal service. But until Western governments find a way to truly disrupt the ransomware business model, operators remain free to keep spouting half-truths and lies at victims' expense.
Meta says it is taking legal action against scraping-for-hire service provider Voyager Labs for allegedly using fake accounts to copy accessible data about users when logged into Facebook, Instagram and other websites. The social media firms says it closed 60,000 fake accounts.
TikTok must pay a fine of 5 million euros to the French government after the country's data protection agency said the short-form video app violated national privacy law restricting the monitoring of web browser activity. TikTok is at the center of a number of privacy controversies worldwide.
Since Elon Musk became Twitter's CEO, cyber risks have affected the social media company in technological, financial, regulatory and reputational ways. Marco Túlio Moraes says the big issue is that the risks now affect a significant digital business world asset: trust.
The prolific ransomware group LockBit has been tied to the recent disruption of Britain's national postal system, as Royal Mail reports it remains unable to send international letters or parcels. While LockBit has enjoyed unusual longevity, could this attack be its undoing?
Twitter says a massive collection of purported user data being sold and then leaked via cybercrime markets was not amassed by exploiting a vulnerability in its systems but is instead "likely a collection of data already publicly available online through different sources."
Managed security services player Cerberus Sentinel plans to capitalize on cloud migration and strict privacy regulations in South America through its proposed purchase of RAN Security. The deal will bolster Cerberus Sentinel's penetration testing, gap analysis and infrastructure management services.
Cybercrime on a global scale is spiraling out of control, and one industry above all seems to be in the crosshairs often: healthcare. Javvad Malik of KnowBe4 discusses how to improve a healthcare organization's security culture and the security awareness of its employees.
Modernizing data breach notification requirements for the telecommunications sector is the focus of a newly announced Federal Communications Commission proceeding. The rules, last updated in 2007, would push for faster consumer notification and require the reporting of accidental data breaches.
Federal regulators have kicked off the New Year with a $16,000 HIPAA penalty against an Atlanta-based medical testing laboratory for failure to provide timely access to a patient records request. The settlement is the 43rd HHS enforcement action in these types of disputes.
In the latest legal volley between the Federal Trade Commission and Kochava, the FTC is asking a federal court to dismiss a "preemptive" lawsuit filed by the data broker last summer, weeks before the regulatory agency filed an enforcement action against the firm alleging data privacy violations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.