Despite the high frequency of major health data breaches involving vendors, many healthcare sector entities remain lax in their approach to manage and reduce third-party security risk, said Glen Braden, CIO and principal of compliance auditing firm Attest Health Care Advisors.
A new guide from the Cybersecurity and Infrastructure Security Agency aims to help healthcare and public health sector entities get a much tighter grip on managing serious risks posed by the most troublesome types of vulnerabilities threatening the beleaguered industry.
New York State will soon seek public comment on sweeping new cybersecurity regulations for hospitals. The proposed rules would come with $500 million in requested funding to help the providers step up their security investments to comply with the new requirements.
Regulating AI is "like regulating Jell-O," said Massachusetts risk counsel Jenny Hedderman, but states are looking at regulating "areas of harm" rather than AI as a whole. In this episode of "Cybersecurity Insights," Hedderman discusses privacy, third-party vendor risk, and lawyers' use of AI.
The number of healthcare organizations and patients affected by a recent data theft at medical transcription firm Perry Johnson & Associates is expanding: The company now says the breach affected the sensitive information of about 9 million people.
This white paper covers the disclosures required by the new SEC rules, the challenges these disclosures present to cybersecurity professionals and tips for managing these challenges with cybersecurity risk management software.
Newly passed cybersecurity rules from the SEC signal a renewed interest in regulating...
Learn why a risk-based perspective on cybersecurity can be a game-changer for your organization. This new study conducted by the analyst firm Enterprise Management Associates (EMA) on behalf of ProcessUnity and CyberGRX is essential reading for every information security professional eager to remain at the forefront...
The financial services threat landscape is continually evolving. Matanda Doss, executive director of cybersecurity and technical controls at JPMorgan Chase, stressed the need to build security measures into an organization's infrastructure, starting with critical assets.
Five regional hospitals in Ontario still have no access to patients' electronic health records and other critical data nearly two weeks after an attack on their shared IT services provider. Ransomware group Daixin Team claims it stole more than 5.6 million patient records in the attack.
A software supply chain security startup led by a longtime Google Cloud engineer closed a Series B round to help protect more open-source software. Seattle-area Chainguard said it can secure approximately 80% of the open-source software existing customers run in their enterprise today.
A Georgia-based firm that provides administrative services for health plans is among the latest firms reporting a major health data hack involving their use of Progress Software's MOVEit file transfer software. NASCO joined a growing list of health sector vendors hit by MOVEit hacks.
In the latest weekly update, ISMG editors discuss how cybersecurity businesses are building resilience during the Israel-Hamas war, the latest on the hacks of Cisco IOS XE devices, and recommendations for businesses in Indonesia looking to improve their cybersecurity practices.
In the latest "Proof of Concept," DXC Technology IT CISO and CyberEdBoard member Mike Baker and Chris Hughes, co-founder and CISO of Aquia, join ISMG editors to discuss benefits, challenges and misconceptions of adopting open-source software in modern code bases - plus best practices for securing them.
The financial services sector handles massive amounts of data and faces increasing cybersecurity risks. With the industry ranking among the top three sectors in data ownership, it manages 2.5 quintillion bytes of data daily. However, technology reliance brings vulnerabilities, and security teams prioritize privacy...
Businesses don’t stand and operate alone. Organizations partner with an average of 10 third-party vendors to manage their operations. These firms include suppliers, manufacturers, service providers, software vendors, distributors, resellers, and agents.
Because of this large and diverse network of companies working...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.