Rhode Island will become the first state in the nation to launch a statewide cybersecurity tool for K-12 schools, offering enhanced protection against ransomware threats with a new, no-cost, federally funded service that will shield 136,000 students across 64 school districts.
The Food and Drug Administration is urging blood suppliers - a recent target of attacks - to bolster their cybersecurity practices to prevent and mitigate cyber incidents that could affect the supply and safety of critical blood and blood components used for transfusions and other patient care.
An insider breach at a Florida pain management firm and an email breach at a Colorado pediatric hospital have resulted in more than $1.7 million in fines for HIPAA violations found by federal investigators. The two incidents affected fewer than 50,000 people.
Ensure FERPA compliance with Netskope's comprehensive mapping guide, designed to simplify data governance and security for educational institutions.
This guide bridges FERPA recommendations with Netskope's cutting-edge solutions to protect student data effectively.
Key Takeaways:
...
Three of the world's largest pure-play cybersecurity vendors recently reported earnings, grappling with SIEM and firewall displacement opportunities along with rebounding from a massive outage. Palo Alto Networks continues to reap the benefits of buying IBM's QRadar SaaS business.
Simplify HIPAA compliance with Netskope's detailed mapping guide, connecting HIPAA security and privacy standards to advanced Netskope tools.
Protect electronic protected health information (ePHI) with actionable insights and tailored solutions.
Key Takeaways:
Map HIPAA requirements...
CEO Anand Eswaran explains how Veeam's $2 billion secondary offering strengthens its financial position as the data resilience vendor prepares for an initial public offering. He discusses the company’s commitment to innovation and strategic pacts with Splunk, CrowdStrike and Palo Alto Networks.
Longtime Tenable CEO Amit Yoran is temporarily stepping aside for cancer treatment and recovery, with top deputies Stephen Vintz and Mark Thurmond stepping up to lead the organization. Yoran was diagnosed in March with a treatable form of cancer, but recently learned he needs additional treatment.
The U.S. Department of Homeland Security is reportedly expanding its use of emerging surveillance tools, including drones and artificial intelligence, without proper safeguards as experts warn of potential privacy violations and risks involving facial recognition and third-party data usage.
Two data brokers pledged to stop using geolocation data gleaned from smartphones to sell services that provide a window to the intimate lives of Americans. "Surreptitious surveillance by data brokers undermines our civil liberties," an U.S. Federal Trade Commission official said.
Lennert Wouters, a researcher at KU Leuven University in Belgium, has spent the past eight years studying embedded security, analyzing the vulnerabilities of everyday devices and commercial products. He shares his greatest hacks and insights on hardware security industry trends.
According to Gartner, “The perimeter security paradigm led organizations to assume that entities were secure within a network protected by perimeter controls designed to keep the “bad guys” out.
However, attackers took advantage of the assumption that an internal IP address was enough to allow...
Hackers can potentially use AI to manipulate data that's generated and shared by some health apps, diminishing the data's accuracy and integrity, said Sina Yazdanmehr and Lucian Ciobotaru of cybersecurity firm Aplite, describing a recent research project involving Google Health Connect.
As former director of information security and privacy at Sonesta Hotels, Michael Woodson championed a proactive approach to cybersecurity. His leadership philosophy underscores the importance of cultural transformation and continuous learning in building robust security programs.
Security researchers have uncovered 16 zero-day vulnerabilities in Japanese equipment manufacturer Fuji Electric's Tellus and V-Server remote monitoring software that enable attackers to execute malicious code in devices commonly used by utilities and other critical infrastructure providers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.