How can an enterprise improve response to emerging threats across a large third-party portfolio? By implementing a comprehensive threat and vulnerability response framework. Gary Phipps of ProcessUnity discusses the third-party risk challenge and solution.
Bitsight's $115 million acquisition of Cybersixgill will merge automated threat intelligence with risk exposure tools. This strategic move reflects the growing demand for streamlined cybersecurity solutions and aligns with Bitsight's mission to enhance cyber-risk management.
Allegations of conflicts of interest in Cyberstarts’ Sunrise program have sparked debate in the CISO community. While the program connected CISOs with startups for advisory purposes, its profit-sharing incentives drew criticism, leading some participants to resign and the firm to halt compensation.
President elect Donald Trump said Thursday he will nominate prominent vaccine skeptic Robert F. Kennedy Jr. as secretary to head up the U.S. Department of Health and Human Services. His stances on health information privacy, security and healthcare sector cyber matters are not well known.
A new playbook from the Health Sector Coordinating Council aims to help manufacturers of medical products such as pharmaceuticals, devices and durable equipment plot out and improve their response to ransomware attacks and other cyber incidents.
The National Institute of Standards and Technology is still struggling with a backlog of over 19,000 security vulnerabilities in its National Vulnerability Database, according to a recent announcement, which acknowledged initial projections to clear the unassessed software flaws were too optimistic.
The Justice Department unsealed an indictment against alleged hackers Connor Moucka and John Binns, accusing them of stealing data from the cloud platform Snowflake, extorting millions in bitcoin and stealing sensitive personal information from over 165 organizations and millions of individuals.
Donald Trump's return to the White House with a renewed focus on deregulation may shift the priorities of federal agencies in enforcing data privacy and cybersecurity policy, said Lisa Sotto, partner at Hunton Andrews Kurth and chairperson of the DHS Data Privacy and Integrity Advisory Committee.
Defence-oriented cybersecurity strategies have historically been favoured to protect organisations’ digital assets. This approach has its roots in the castle-and-moat strategy, which was utilised in the 1990s and early 2000s to protect a small number of known assets.
However, defensive strategies are inherently...
Ransomware attacks on healthcare organizations are becoming more frequent—and more devastating. While many healthcare providers rely on Endpoint Detection and Response (EDR) as their main line of defense, this strategy is falling short. EDR is designed to catch specific threats, but it doesn’t address the full...
A federal court has finalized an $8 million settlement in a consolidated proposed class action lawsuit against law firm Orrick Herrington & Sutcliffe involving a hack that affected several clients and more than 638,000 individuals. It is one of several law firms facing similar data breach problems.
The Australian government is on track to introduce a bill in the Parliament to ban youths under the age of 16 from accessing social media platforms, but critics say age verification technologies are not accurate and a ban may push children into unsafe, less visible parts of the internet.
Anastasia Georgievskaya, CEO and co-founder of Estonia-based Haut.AI, discusses the challenges of blending artificial intelligence with traditional skincare expertise and how Haut.AI is shaping a privacy-conscious future in beauty. Georgievskaya is also a research scientist at Beauty.AI.
Embargo, a newcomer group to the ransomware scene, is threatening to begin publishing 1.15 terabytes of data belonging to a small rural Georgia hospital and nursing home attacked last week unless a ransom is paid before Tuesday. Experts say the double extortion gang disables victims' security tools.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.