There have been several market and technology changes recently that converged to create a perfect storm in endpoint security. The COVID-driven transformation of remote work, the proliferation of ransomware as a service, and increasingly sophisticated, automated attacks, has led to a wider attack surface and increase...
New guidance provides healthcare entities and medical device makers a jump-start for negotiating critical cybersecurity issues pertaining to procurement contracts, says Jim Jacobson of device manufacturer Siemens Healthineers, co-chair of an industry group that developed the contract template.
U.S. government agencies, including the Department of Energy, CISA, the NSA and the FBI issued a joint cybersecurity advisory about advanced persistent threat actors using new tools and malwares to target industrial control systems and supervisory control and data acquisition devices.
Accenture's new ransomware report reveals key challenges in executing an effective communications plan. Robert Boyce, managing director of global cyber response, discusses why existing recovery strategies aren't enough and offers practical steps for managing a ransomware response.
In our latest report, we detail seven primary cyber threats that organizations across the financial services sector will face in 2022. Some of them, such as ransomware, are not new but nevertheless remain a serious threat. Others, such as decentralized finance (DeFi) and cryptocurrencies, are newer, so to speak, and...
In order to keep pace with the card fraud threat landscape, financial institution CISOs must continually refresh their awareness and understanding of card fraud tactics, techniques, and procedures (TTPs). Even for the novice cybercriminal, there are few barriers to entry and near-infinite resources in illicit forums...
Researchers say five critical vulnerabilities in certain mobile hospital robots - if exploited - could allow hackers to interfere with delivery of medication and supplies, elevator operation and patient privacy. Some experts say the situation is a reminder of commonly overlooked IoT device risks.
Targeted attacks on a Ukrainian energy facility have been confirmed by CERT-UA. In a joint operation carried out by the Ukrainian CERT with security companies Microsoft and Eset, it was found that an ICS-capable malware and several regular disk wipers were used in the attack.
As use of Apple devices has grown in the enterprise, the company has increasingly become a target for malware threats and other attacks. ISMG spoke with experts and CISOs about the seriousness of these threats and what organizations can do to mitigate the risks.
With ongoing supply chain attacks and the rise of ransomware, fears that we are on the brink of cyber war, and global TPRM-focused regulation on the horizon, third-party cyber risk management has never been more critical - or more challenging.
In this timely session with Vanessa Jankowksi, VP and GM of Third Party...
Almost every organization today is undergoing some form of digital transformation. Each new technology and step in this journey can expand the attack surface and expose more assets to the Internet, leaving them vulnerable to threat actors. The explosion of machine identities, cloud entitlements, and remote access...
Five recently reported data breaches involving cyberattacks on a variety of different types of healthcare sector entities have affected a total of more than 1.2 million individuals. Experts say the incidents highlight the intensifying threat landscape in the sector.
The Food and Drug Administration on Thursday issued revamped draft guidance providing updated and detailed recommendations for how medical device makers should address cybersecurity risk in the premarket of their products, especially as the threat landscape continues to evolve.
CrowdStrike, Microsoft and Trend Micro sit atop the Forrester Wave for endpoint detection and response as vendors grapple with business data increasingly moving to the cloud. This has forced EDR providers to build out full-fledged Extended Detection and Response platforms that protect cloud data.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.