At least 10 U.S. government agencies are planning to increase the use of facial recognition technologies by 2023, according to a GAO report. The growing utilization comes as facial recognition technology raises privacy concerns.
Phishing, ransomware and unauthorized access remain the leading causes of personal data breaches as well as violations of data protection rules, Britain's privacy watchdog reports. The U.K. government has also been caught out by breaches and leaks involving military secrets and CCTV footage from a government building.
In the latest weekly update, four editors at Information Security Media Group discuss timely cybersecurity issues, including cryptocurrency exchange hacks and the cyber implications of the U.S. withdrawal from Kabul.
Four months after Microsoft released the first security update for flaws in several versions of its on-premises Exchange Server software, the company has issued its first official guidance on the three actively exploited ProxyShell vulnerabilities.
After a string of high-profile hits, many of the largest and most notorious ransomware operations recently disappeared. But the pace of ransomware attacks hasn't diminished because of a steady influx of new operations, existing operations getting more sophisticated and old players rebranding.
Cloud-based SIEM and SOAR are just two of the new solutions that represent the modernization of security operations. Greg Martin of Sumo Logic discusses how such solutions are helping enterprises overcome legacy technology challenges such as visibility and complexity.
As the lines blur between identity and privilege, there is a growing set of solutions to secure the anytime, anywhere workforce. Archit Lohokare, CyberArk’s vice president of product management, discusses passwordless authentication, zero trust and other ways enterprises are modernizing identity and access.
In the first half of 2021, Fortinet's FortiGuard Labs detected a 10-fold increase in weekly ransomware activity as compared to 2020. This is just one of the trends detailed in the Global Threat Report for the first half of 2021. Derek Manky of FortiGuard Labs analyzes the trends and takeaways.
Although a majority of financial services executives predict that cryptocurrency will replace or rival fiat currency within the next five to 10 years, they say cybersecurity, regulatory and privacy issues are among the biggest obstacles to its adoption, according to a survey by Deloitte.
They are high-profile, they have access to your company's most vital information, they rely on unsecured personal devices - and your cyber adversaries are targeting them. They are your board members, and Chris Pierson of BlackCloak has ideas on where and how you can better secure these leaders.
The Biden administration unveiled a package of supply chain and critical infrastructure security initiatives following a meeting at the White House with tech executives and others. Companies such as Google and Microsoft also promised billions in spending on cybersecurity over the next several years.
As a technology and security leader, Laura-Lea Berna is driven to defend gaps. But as a business executive, the VP, IT and CIO of BC Transit has built her career on answering the question "Where's the need?" She discusses her path and role as a mentor to up-and-coming leaders.
Bitdefender has conducted a forensic analysis of a new backdoor, dubbed Sardonic, used by the threat group Fin8 in recent attacks against two financial organizations.
Indianapolis, Indiana-based Eskenazi Health has acknowledged that hackers stole some data and posted it on the darkweb after a ransomware attack. But the organization says it's not yet determined if individuals need to be notified because its investigation is still underway.
Researchers at The Citizen Lab at the University of Toronto say they've found a new zero-click iMessage exploit that's been used by the government of Bahrain to install the NSO Group's Pegasus spyware on the devices of human rights and political activists.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.