The many kinds of OT and IoT gear that are not regulated medical devices but are critical to run hospitals and other care facilities present a variety of cybersecurity and patient safety concerns, said Dr. Benoit Desjardins, professor of radiology at the University of Pennsylvania Medicine.
Ransomware groups hope threats are enough to sway victims so they don't have to follow through. For victims who pay ransoms, the results are almost guaranteed to be less than advertised - more akin to buying a pig in a poke than a contractual guarantee of service.
Leading minds from Microsoft and elsewhere discuss the transformative role of artificial intelligence in cybersecurity, highlighting the power of AI in enhancing defenses, its use by adversaries and how it can be applied in the fight against cyberthreats.
The Department of Defense has announced its inaugural Chief Digital and Artificial Intelligence Officer Craig Martell is stepping down from his role after establishing the office as a small but influential team within the department over the last two years.
Artificial intelligence is turning everything it touches into a golden investment opportunity. Edge computing - which is set to play a pivotal role in deploying AI, according to International Data Corp. - is in line to receive $350 billion worth of investments by 2027.
Facebook's attempt to navigate European privacy regulations by giving users a fee-based opt-out from behavioral advertising triggered backlash from more than a dozen European politicians who accused the social media giant of treating human rights as a commodity.
In the latest weekly update, Grant Schneider of Venable LLP joined three ISMG editors to discuss the future of U.S. federal cybersecurity and privacy legislation, AI integration and recent CISA developments - all set against a backdrop of political complexities.
Microsoft Copilot for Security is making waves, offering security analysts massive efficiency improvements, accuracy boosts and a much-needed reduction in operational stress. The AI-assisted technology will be generally available April 1 to Microsoft customers and partners worldwide.
What does "digital resilience" mean in today's enterprise, and why is it so hard to practice at scale? Optiv's John Pelton and Splunk's Anthony Pierce talk about how to leverage tools, partnerships and personnel to boost and sustain one's digital resilience.
A co-administrator of an illicit online marketplace received a 42-month prison sentence in U.S. federal court after pleading guilty to two criminal counts that could have put him in prison for 15 years. Sandu Boris Diaconu, 31, helped develop and administer the E-Root marketplace.
Healthcare organizations and makers of medical devices need to think about how to safeguard their critical medical gear against future cyberthreats, including the looming dangers posed by quantum computing, said Mike Nelson, global vice president of digital trust at security firm DigiCert.
In the aftermath of a ransomware attack several years ago, Hackensack Meridian Health embarked on transforming its cybersecurity program with the support of top leadership and increased funding and staff and by implementing critical security tools and best practices, said CISO Mark Johnson.
Wiz is reportedly set to buy centralized cloud threat management vendor Gem Security for $350 million, Bloomberg reported this week. The deal would come just four months after Wiz made its first-ever acquisition, scooping up cloud-based development platform Raftt for as much as $50 million.
For the love of humanity, please stop playing into ransomware groups' hands by treating their data leak blogs as reliable sources of information and then using them to build lists of who's amassed the most victims. That's not what data leak sites actually document.
The underrepresentation of women in cybersecurity is a complex issue. The reasons behind it include stereotypes and biases, educational barriers, workplace culture, and the lack of visibility and role models. We need to consider the implications and discuss potential strategies for change.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.