In the ever-evolving landscape of digital transformation, the convergence of Information Technology (IT) and Operational Technology (OT) emerges as a pivotal paradigm shift. Understanding the interconnected nature of these domains is not just a technical requirement but a strategic imperative for businesses seeking to...
Any company with industrial assets faces elevated cybersecurity risks from their operational technology (OT) environments. Although many CISOs have not been responsible for or prioritized OT in the past, they should examine their strategic goals of vendor consolidation and the convergence of their information...
75% of OT organizations reported at least one intrusion in the last year, and nearly 33% of respondents reported being victims of a ransomware attack. In addition, intrusions from malware and phishing increased 12% and 9%, respectively. In short, OT security is under attack.
This report is based on data from an...
Security experts told ISMG they were concerned Microsoft could suffer future cyberattacks and threats to its customers after a Russian state hacking group managed to evade detection for several weeks while targeting accounts associated with the company’s top executives.
Vulnerability Management is becoming more difficult than ever.
As the attack surface has grown, the security industry has become obsessed with detecting every possible vulnerability. Our ability to address these vulnerabilities hasn’t kept pace with the millions of vulnerabilities from dozens of sources found in...
The European Union adopted regulations on cyber hygiene intended to beef up cybersecurity at EU government agencies amid concerns that trading bloc institutions have failed to keep pace with mounting digital threats. European agencies lack "cyber preparedness commensurate with the threat."
Mimecast announced the acquisition of human risk management solutions specialist Elevate Security as part of its initiative to enhance digital workplace protection. The move aims to address evolving cyberthreats by offering insights into human behaviors and risks and empowering customers.
In the latest weekly update, four ISMG editors discussed the number of ransomware victims who are paying a ransom to cybercriminals, the need for greater cyber resilience during wartime, and the critical role of human risk management in organizational cybersecurity in the era of remote work.
More than 80% of employees are using software applications that haven’t been approved by IT.
What else is hiding in your environment?
Businesses today are using an unprecedented number of tools and apps in their day-to-day operations—and the ones you don’t know about could put a significant strain on your...
More than 80% of employees are using software applications that haven’t been approved by IT. What else is hiding in your environment?
Businesses today are using an unprecedented number of tools and apps in their day-to-day operations—and the ones you don’t know about could put a significant strain on your...
On Nov. 8, Tenable Chairman and CEO Amit Yoran wrote a letter to Congress in support of CISA. In this episode of "Cybersecurity Insights," Yoran calls the agency the "primary focal point of our defensive efforts" and discusses why the country needs to stay unified on defeating cyberthreats.
In the constant struggle to manage the other five pillars - identify, protect, detect, respond and recover - security leaders often do not have governance at top of mind, said Netography CEO Martin Roesch, but he added, "Good governance is the root of having good security."
BlueVoyant purchased a risk management vendor led by an Army veteran to expand its SaaS footprint with U.S. government and defense industrial organizations. Buying Conquest Cyber will allow BlueVoyant to provide cyber risk maturity and compliance assessments to both federal and commercial customers.
In an age reliant on operational technology, ensuring robust security for diverse industries is crucial. Join us as we discuss operational challenges, highlighting specific threats faced by businesses today. Explore how the powerful alliance between HCLTech and Microsoft empowers organizations to safeguard critical...
A new guide from the Cybersecurity and Infrastructure Security Agency aims to help healthcare and public health sector entities get a much tighter grip on managing serious risks posed by the most troublesome types of vulnerabilities threatening the beleaguered industry.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.