Health technology providers - including makers of mobile health apps, personal health records, fitness devices and other related products - must keep a watchful eye on critical evolving privacy and regulatory issues in the months ahead, says attorney Brad Rostolsky of the law firm Reed Smith.
Preventing rogue device attacks is a critical component of Baptist Health's zero trust strategy, says Michael Erickson, CISO of the healthcare delivery system, which operates nine hospitals and other care facilities in Kentucky and Indiana.
The Cloud Security Alliance's new medical device incident response playbook aims to help healthcare entities plan for security incidents involving different types of devices, taking into consideration varying patient safety issues, say co-authors Christopher Frenz of Mount Sinai South Nassau and Brian Russell of...
The Data Divide spans sectors, organizations,
individuals and communities — and not for a shortage
of data but for a shortage of focus beyond “productivity,
efficiency and innovation.” But it doesn’t have to be that
way. There are interventions, new ways of working and
strategies for overcoming the Data...
This ebook explains how eBPF provides critical visibility that
engineers just can’t achieve via other means in distributed,
cloud-native environments. We discuss the role of eBPF in
providing crucial context that helps teams optimize not only
network performance, but also application performance. When
you...
Across the globe, more people are working from home than ever before.
A single pane of glass for all conversations, Slack creates an environment where remote workers can organize information and conversations around data. Every day, more than 12 million active users and 750,000 organizations rely on Slack to be...
As Russia masses troops on its border with Ukraine, the White House says Russian disinformation campaigns have been aimed at destabilizing Ukraine's government, while experts have seen a surge in "cyber intrusions" against infrastructure, banking and government targets in advance of a potential invasion.
Federal authorities have issued an advisory warning about remotely exploitable security vulnerabilities in certain Fresenius Kabi infusion pump systems that could allow an attacker to gain access to sensitive information, modify settings, or perform arbitrary actions as an authenticated user.
A flaw in a Bluetooth-enabled at-home COVID-19 test, which has since been fixed, would have allowed individuals to change test results from positive to negative, and vice versa, says a report by the security researcher who discovered the problem. Are other medical IoT products at similar risk?
Phishing is one of the most well-known cyberattack methods, but hackers still have considerable success despite security teams' best efforts. Attackers use phishing attacks to gain access to login credentials, financial information like credit card details or bank accounts, company data, and any other digital assets...
Ransomware continues to evolve at warp speed and is always a potential threat, regardless of your company’s size, location, or industry.
Today’s ransomware threat is more advanced than attackers simply asking for a payment. Some threat actors care more about stealing your company’s data. At any given moment,...
The massive shift to remote work has increased the complexity of securing the endpoint. The 2022 Endpoint Security Visibility Report, commissioned by Tanium and produced by Cybersecurity Insiders, the 500,000-member information security community, reveals real impacts to business when there is a security...
Network compromise drives big business on the dark web. Cybercriminals are actively buying and selling unauthorized network access in a variety of underground forums.
This specific variety of criminal market offerings is less well known than others, but the extended cybercrime activity it enables is impacting...
The spyware of sanctioned Israeli firm NSO Group was reportedly detected on the smartphones of high-profile Polish figures associated with the nation's opposition party. And the spyware has also reportedly been tied to the phone of Hanan Elatr, wife of the late journalist Jamal Khashoggi.
Businesses around the world rely on email to communicate — in the post-pandemic world perhaps more than ever before. But
email is inherently insecure, with a staggering 94% of malware delivered via the email channel.
Download this whitepaper to learn more about:
Preventing Email Data Leaks
Protecting...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.