London, Information Security Media Group recently brought together top cybersecurity professionals, executives and thought ...
Recent mega data breaches involving third-party vendors - such as the Change Healthcare cyberattack - are intensifying the spotlight on critical security risk management and governance issues for ...
As federal regulators step up enforcement of privacy and security requirements under the HIPAA Omnibus Rule, healthcare organizations face key compliance challenges, including dealing with their ...
How Do Risk Assessments Influence Strategy, Solutions? A risk assessment is a critical element of an effective risk management process - and it is also required for healthcare entities under the HIPAA ...
John F. Banghart shares insights from his 30-year journey in cybersecurity, and the importance of creative thinking, ...
Data warehousing platform Snowflake rolled out default MFA - as well as a 14-character password minimum - to shore up security in the wake of a series of cyberattacks in June that hit high-profile ...
U.S. federal prosecutors indicted a Chinese national employed by a state-owned aerospace and defense conglomerate with a yearslong phishing campaign aimed at extracting software developed for NASA.
The Irish data regulator launched an investigation to determine Google's compliance with a European privacy law when it was ...
Welcome to Information Security Media Group's Black Hat and DEF CON 2024 Compendium featuring latest insights from the industry's top cybersecurity researchers and ethical hackers, as well as ...
Strider Technologies has raised $55 million in a Series C funding round to strengthen its AI capabilities and fuel global expansion efforts. The money will enhance the company’s AI-driven insights, ...
Excessive deployment of remote access tools in operational technology environments expands attack surfaces and creates operational challenges, warn security researchers from Claroty. Remote access ...