Following Rubrik's announcement that it plans to list on the New York Stock Exchange, another company is considering trying its luck in the public market. Claroty is meeting with underwriters ahead of a possible 2025 IPO that could value the cyber-physical systems security titan at $3.5 billion.
A second cybercriminal gang - RansomHub - is trying to shake down Change Healthcare's parent company, UnitedHealth Group, and have it pay another ransom for data that an affiliate of ransomware-as-a-service group BlackCat claims to have stolen in February. Is this the latest ruse in a messy attack?
Foundations housing seven large open-source projects are banding together ahead of what they say is a nearly impossible 2027 deadline created by Europe's Cyber Resilience Act - the world's first digital supply chain regulation. European Union lawmakers approved the act in March.
Organizations face a growing challenge in managing third-party risks due to the expanding number of relationships and limited resources. Traditional risk management practices are struggling to keep up, leaving organizations vulnerable to unassessed risks. A comprehensive solution incorporating advanced automation and...
To prepare for compliance with the EU's Digital Operations Resilience Act (DORA), organizations must assess its impact on their supplier ecosystem and understand regulatory expectations by the 2025 deadline. This white paper offers insights into DORA's ICT-related regulations, implications for Third-Party Risk...
This white paper will explore the process of prioritizing third parties for incident response, building and distributing an incident-response questionnaire, and reporting on an organization’s risk status after a threat has been identified and evaluated.
Organizations are overwhelmed by the many indicators of...
Security researchers are warning about a relatively new malware called Latrodectus, believed to be an evolutionary successor to the IcedID loader. It has been detected in malicious email campaigns since November 2023, and recent enhancements make it harder to detect and mitigate.
As recovery from its Feb. 21 cyberattack continues, Change Healthcare and its parent company UnitedHealth Group are facing a growing pile of lawsuits, while health sector entities affected by the IT services disruption are dealing with a mounting stack of bills and other paperwork to catch up on.
In the latest weekly update, ISMG editors discussed key insights on OT security from the Cyber Security for Critical Assets Summit in Houston, the implications of a critical Linux utility found to have a backdoor, and a CISO's perspective on comprehensive cloud security strategy.
As Web 3.0 gains momentum, it poses major risks - economic uncertainties, cyberthreats and communication challenges, said RAID Square CEO Sébastien Martin. "There is a lot of regulation, and if you're not respecting the regulation, there is a lot of risk in terms of reputation," he said.
As organizations embrace digital transformation, software security challenges have become increasingly complex. Adriana Freitas, director of the European Foundation Anti-Phishing Working Group, offers insights on the imperative role of DevSecOps in modern cybersecurity practices.
Besides not doing cyberthreat modeling at all, some the biggest mistakes medical device manufacturers can make are starting the modeling process too late in the development phase or using it simply as a "paper weight exercise," said threat modeling expert Adam Shostack of Shostack & Associates.
The European Data Protection Board guides the harmonization of regulations across 27 EU member states. EDPB Chair Anu Talus sheds light on the board's mission and the transformative impact of the General Data Protection Regulation since its inception in 2018.
The Energy Department is hoping to catalyze next-generation solutions to cybersecurity vulnerabilities in the energy sector by funding the creation of university-based cyber energy centers nationwide that will bring together private sector partners and the future of U.S. cyber talent.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.