On this week's "Sound Off," we ask John Kindervag, the founder of Zero Trust, for his reaction to the recently released Office of Management and Budget federal strategy to move the U.S. government toward a mature Zero Trust architecture.
Whether it's clients demanding robust data protection, surging ransomware attacks, or risky behavior by company insiders, law firms are under pressure to implement a comprehensive data protection strategy.
A 60-second TV advertisement, paid for by cryptocurrency exchange platform Coinbase. aired during the Super Bowl on Sunday. It featured a QR code that took those who scanned it to the trading website. Some cybersecurity experts have voiced concerns about using vulnerable QR code on live TV.
The U.S. CISA has issued a "Shields Up" alert to U.S. organizations to protect against potential retaliatory cyberattacks at the hands of the Russians - especially if the Biden administration intervenes in the country's conflict with Ukraine, where Russia has massed some 100,000 troops.
Hefty proposed settlements have been reached in class action lawsuits involving two separate health data breaches affecting millions of individuals. The incidents were reported by a Texas-based administrative services vendor in 2021 and a Puerto Rico-based clearinghouse in 2019.
Days after the Federal Bureau of Investigation and the U.S. Secret Service issued a cybersecurity advisory on the ransomware-as-a-service group BlackByte, it hit the corporate IT network of the U.S. National Football League's San Francisco 49ers team.
Security experts explain how the Rust programming language helps the BlackCat ransomware group execute targeted attacks on critical infrastructure. Compared to traditional languages like C or C++, Rust brings speed, security, stability and unparalleled detection evasion capabilities to the table.
Russian authorities have continued to arrest alleged administrators of multiple Russian-language cybercrime markets and communities, including Ferum Shop, Sky-Fraud and Trump's Dumps. It follows last month's arrest of suspected REvil/Sodinokibi ransomware affiliates based in the country.
A massive data breach has been uncovered by researchers who say the incident totals in excess of 172 GB of data and affects an estimated 19 million people. The victims are primarily customers of online appointment company FlexBooker, researchers say.
In a declassified letter to CIA Director William Burns and DNI Avril Haines from 2021, two U.S. senators urged transparency around alleged "bulk surveillance" conducted by the CIA in response to now-declassified documents compiled by the Privacy and Civil Liberties Oversight Board.
Bipartisan legislation introduced by two U.S. senators aims to kick-start the modernization of "outdated" health privacy laws by creating a commission to examine regulatory gaps, including how to address health data falling outside of HIPAA's reach.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including how the BlackMatter ransomware group has rebranded itself yet again, how the DOJ confiscated stolen Bitcoin worth more than $4 billion and takeaways from a U.S. Senate hearing on open-source...
Nellie Liang, under secretary for domestic finance at the U.S. Department of the Treasury, was the only witness at a virtual hearing on the President's Working Group report on stablecoins - virtual currencies pegged to fiat currency. Lawmakers weighed in on the benefits and dangers of stablecoins.
Facial recognition as a tool is not bad, but the manner in which it is used can make it look bad, says Brett Johnson, a consultant on cybersecurity, cybercrime and ID theft who was a central figure in the cybercrime world for over 20 years.
Ransomware attacks in 2021 amassed a record number of victims in critical infrastructure sectors across Australia, the U.K. and U.S., those countries' lead cybersecurity agencies warn. They share intelligence on attackers' latest tactics to better equip domestic organizations to defend themselves.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.