An Arizona firm that provides administrative services to a dozen ophthalmology practices in several states is notifying nearly 2.4 million patients of a data theft incident. The hack is among the latest recent major data breaches involving vendors of critical services to healthcare firms.
California privileged access management vendor Delinea announced it will acquire identity governance and administration vendor Fastpath. "We believe privilege, not just identity, is the true security perimeter," said Delinea Chief Product Officer Phil Calvin.
Australian telecom company Tangerine is blaming the compromise of a third-party contractor's credentials for exposing personal information of 232,000 customers, which had been stored in a legacy database. The breach exposed customers' names, birthdates, mobile numbers, addresses and account numbers.
Cloud security threats continue to rise, and adversaries show no signs of letting up.
The effectiveness of cloud security depends on defenders’ ability to collect, correlate, and analyze data across on-premises, hybrid, and multi-cloud environments. Modern defenders need to find exploitable weaknesses...
Jeff Shiner, CEO of the popular password management company 1Password, said Monday that the company is acquiring leading device security platform Kolide in response to the "historic transformation of the workplace that demands transformative and intuitive new security solutions."
Security operations are more vital — and visible — than ever, but challenges abound for the SOC: fast-changing environments, disjointed security tools, a deluge of data, an analyst shortage, and more. Overcoming these obstacles requires a modern SIEM solution that harnesses the power of AI, analytics, and...
Global data center provider Zenlayer exposed an internal database accessible on the internet, revealing approximately 384 million records. A spokesperson said no internal or customer operational data, credentials or network traffic was affected.
When a hospital or clinic is hit with a cyberattack, it often seems as if the electronic health record systems just can't win. Even if the EHR system is not the prime target of the attack, it's still frequently taken off line as the organization responds to the incident. What should entities do?
Sophos announced Thursday that its CEO for the past 12 years, Kris Hagerman, has stepped down. Long-time Sophos executive Joe Levy, who has nearly three decades of experience in cybersecurity products and services, is the new president and acting CEO, "effective immediately."
Protecting our identities is extremely important. An identity fabric is a robust identity control framework, but before you can roll one out, you need to understand all aspects of the IAM life cycle, assess all the areas of risk and make sure that remediation controls are in place.
Operational efficiency improved by 75%.
Secure access service edge provides a unified cloud solution for organizations with branches and remote workers. A strong SASE solution not only solves connectivity and security challenges, it creates operational efficiency and significant long-term cost savings.
In December...
This week, the Zeus leader pleaded guilty, Prudential detected hackers, U.S. telecoms have to report breaches, Microsoft patched zero-days, researchers said Chinese threat intel is faulty, ransomware hit Romanian healthcare entities, Juniper was breached and Poland allegedly previously used Pegasus.
In this 30-minute session, experts from CyberArk’s field technology office explain how to maximize risk reduction by seamlessly managing and securing all identities.
Supply chain security firm Eclypsium found corporate VPN maker Ivanti's Pulse Secure devices - which underwent much emergency patching amid a likely Chinese espionage zero-day hacking campaign - operate on an 11-year old version of Linux and use many obsolete software packages.
"Identity Security maturity is grounded in four tenets: Identity Security tools, integration, automation and continuous threat detection and protection. Enterprise Strategy Group (ESG) surveyed 1,500 identity-related security experts across 16 countries to explore the business goals that drive organizational alignment...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.