A slew of top tech executives and artificial intelligence researchers called for a minimum half-year pause on advanced artificial intelligence systems. Tech giants already have fallen into a race to see who can be the quickest to incorporate AI into their products.
Agility and security do not have to be in conflict, and businesses of all sizes have the capacity to innovate swiftly and operate securely.
Join us for a webinar on how cloud security will bring together leading technologies to provide comprehensive cloud security solutions. Through collaboration, we will discuss...
True end-to-end cloud security involves protecting data and resources throughout the entire cloud environment – from the user's device to the cloud service provider's servers – and back again. A combination of physical, technical, and administrative controls that are designed to safeguard data, applications, and...
In times of economic uncertainty, security teams are tasked to do more, but with fewer resources, making it more difficult to mitigate cyberthreats. The status quo of standard tools & methods make it overly complex and inefficient when it comes to the use of both money and human capital (of which there is a growing...
The European Central Bank will conduct cyber stress tests to determine banks' resilience against cyberattacks. The tests, which will receive a "significant amount of time and resources," are set to be completed by mid-2024, said Andrea Enria, ECB's top official for oversight.
Identity verification and e-signature firm OneSpan is working with investment bank Evercore on a sale process that could attract interest from other businesses and private equity firms, Reuters reported. This follows five publicly traded cyber vendors agreeing to go private since the start of 2022.
Because open source usages is now so pervasive, companies are increasingly concerned about the security of applications built on the foundation of open source components. Organizations are also keenly aware of the legal risks of failing to comply with the open source licenses that govern the components they use....
In a post-pandemic world the new norm means that organizations have shifted to hybrid / remote work, taking your organization’s most important entities outside of the network: your data, applications, and users. As a result, traditional perimeter-based tools like network firewalls and VPNs are proving more and more...
In today's rapidly evolving threat landscape, cyber attacks are becoming more sophisticated, with spear phishing attacks now the most common way for cybercriminals to enter an organization. With the advent of new technologies like ChatGPT and Deepfakes, the situation is only getting worse. ChatGPT is being used to...
According to the World Economic Forum, geopolitical instability has helped to close the perception gap between business and cyber leaders' views on the importance of cyber risk management, and "91% of all respondents" believe that "a far-reaching, catastrophic cyber event" is on the horizon.
In this episode of "Cybersecurity Unplugged," Patricia Muoio, a partner at SineWave Ventures, discusses the need for cyber resilience as security leaders face the inevitable stream of cybercrimes, how to achieve it through a zero trust approach, and how CISOs and the government can help.
The need to implement zero trust at scale is growing ever more critical. In this video interview with Information Security Media Group, subject matter experts Srinivas Tummalapenta of IBM and Justin Douglas of Palo Alto discuss the guiding principles of scaling zero trust.
Security ratings provide a strong indication of potential risk, but boards increasingly want to drill into the underlying risk factors, says CEO Steve Harvey. BitSight has invested in both workflows around third-party risk and research and identification of CVEs on behalf of government agencies.
See how simple and effective security controls can create a framework that helps you protect your organization and data from known cyber attack vectors.
This publication was designed to assist executives by providing guidance for implementing broad baseline technical controls that are required to ensure a robust...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.