Federal regulators and SolarWinds are eyeing a truce weeks after a judge dismissed most claims related to misleading investors about the company's security practices and risks. SEC lawyer Christopher Bruckmann said his team "proposed specific settlement terms," but the defense is unlikely to accept.
AI is rapidly transforming industries, but its power comes with a hidden vulnerabilities: traditional security methods struggle to keep pace with the unique threats facing AI models.
Malicious attacks can harm your AI and damage your business.
The biggest challenge? Knowing what AI models you even have.Many...
The intersection of cyber supply chain security and third/fourth-party risk management presents significant challenges for CISOs. Here's how to take a proactive, comprehensive approach to cyber supply chain risk management to protect critical assets and enhance resilience against evolving threats.
Most hospitals prioritize cybersecurity but often lack the necessary resources to comply with these goals. The question becomes not about the practices, but the potential barriers to implementation, according to John Riggi at the American Hospital Association.
Healthcare organizations are shifting from outdated methods, endless spreadsheets and repetitive requests, in favor of modern, efficient approaches, said Shane Hasert, director of threat research and cyber security standards at ProcessUnity. Hasert described the current state of third-party risk management as...
The American Hospital Association and Health Information Sharing and Analysis Center are urging the healthcare sector to step up its supply chain security and resilience as disruptive cyberattacks target critical suppliers, including last week's attack on a Florida-based blood donation center.
BlueVoyant's Cyber Defense Platform combines proactive and reactive security measures with internal and external capabilities. CEO Jim Rosenthal explains how this comprehensive approach allows clients to manage cyber risks effectively and achieve a desired state of cyber defense readiness.
Small and medium-sized businesses are vulnerable to cyberthreats, often due to insufficient investment in security measures. Joe Levy, CEO of Sophos, shares insights on enhancing SMB cybersecurity outcomes, with a focus on combating ransomware and protecting vital supply chains.
Staying ahead of cyber threats requires more than just reactive measures—it demands a proactive approach informed by reliable data and robust analysis.
As economic pressures mount, CISOs face increasing demands to optimize their cybersecurity budgets while maintaining robust defenses. This webinar delves into strategies for maximizing security investments and the benefits of technology consolidation. Learn how to navigate budget scrutiny and leverage a unified...
A supply chain security firm led by an ex-Google Cloud engineer closed a Series C round to assist AI workloads and expand its open-source software catalog. Chainguard raised $140 million just eight months after completing a $61 million Series B funding round, tripling its valuation to $1.12 billion.
Third parties present risks that can have significant negative impacts on your organization, including data breaches, reputational damage, regulatory violations, and financial losses. Assessing and monitoring these risks is complex, time consuming, and resource intensive, often leaving you with significant gaps in...
Working with third parties introduces new business risks, making it crucial to design a third-party risk management (TPRM) program that enables privacy compliance. What steps can you take to build a TPRM program that aligns with your privacy goals?
Download this checklist for help with:
Understanding what to...
When vendors or contractors don't deliver, the impact can be devastating and long-lasting without a proper third-party risk management program in place. See the path to managing third-party risk effectively with a checklist that outlines the six steps for a sound TPRM program.
Download this whitepaper to learn how...
It's been nearly 18 months since ChatGPT paved the way for rapid generative AI adoption, but enterprises are just beginning to implement basic cybersecurity strategies and use blocking controls, DLP tools and live coaching to mitigate gen AI risks, according to security firm Netskope.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.