The Food and Drug Administration is urging blood suppliers - a recent target of attacks - to bolster their cybersecurity practices to prevent and mitigate cyber incidents that could affect the supply and safety of critical blood and blood components used for transfusions and other patient care.
As organizations expand their reliance on interconnected systems and third-party services, the attack surface grows, exposing critical vulnerabilities in supply chains, APIs, and external-facing assets. Security leaders must understand and address these risks to safeguard operations and maintain resilience.
View this...
Major grocery store chains, Starbucks and other large organizations are experiencing disruptions following a ransomware attack against supply chain management service provider Blue Yonder. The provider said it is continuing to probe the attack and has no timeline for service restoration.
David Anderson's career began in banking and followed a path to the rapidly changing world of cyber insurance. Anderson, vice president of cyber liability at Woodruff Sawyer, shares how he built a practice rooted in transparency, trust and client education.
The Consumer Financial Protection Bureau's open banking ruling shifts liability burdens onto banks, amplifying their responsibilities for securing data shared with third-party fintechs. John Horn at Datos Insights explains the potential for third-party breaches.
Evolving global regulations and an increasing reliance on third parties are reshaping how organizations think about risk. As more goods and services are outsourced, businesses face rising privacy, security, compliance, and operational risks, making the effective management of third parties mission critical.
Given...
Organizations around the globe are using third parties to accomplish business goals, and those vendors have become integral to creating a wider reach for those companies. As a result, they also bring risk and potential security issues to their partners. That’s why it’s imperative for security teams to implement a...
A new playbook from the Health Sector Coordinating Council aims to help manufacturers of medical products such as pharmaceuticals, devices and durable equipment plot out and improve their response to ransomware attacks and other cyber incidents.
The Justice Department unsealed an indictment against alleged hackers Connor Moucka and John Binns, accusing them of stealing data from the cloud platform Snowflake, extorting millions in bitcoin and stealing sensitive personal information from over 165 organizations and millions of individuals.
Defence-oriented cybersecurity strategies have historically been favoured to protect organisations’ digital assets. This approach has its roots in the castle-and-moat strategy, which was utilised in the 1990s and early 2000s to protect a small number of known assets.
However, defensive strategies are inherently...
Financial services leaders and cybersecurity experts said at Information Security Media Group’s 2024 Financial Services Summit that third-party vendor security risks required the need for proactive, multi-layered security frameworks to combat the growing threat landscape.
Finnish telecommunications equipment manufacturer Nokia is investigating the alleged posting of source code data on a criminal hacking forum. A hacker going by the handle of "IntelBroker" on Thursday posted what he said is a trove of "Nokia-related source code."
Cybercriminals know that big targets like major financial services and healthcare organizations have robust defenses around their own assets. But access to that data is also possible through the dozens or even hundreds of SaaS applications and other IT providers that businesses rely on.
Check out this whitepaper to...
CrowdStrike has countersued customer Delta Air Lines, accusing the airline of employing a lawsuit and seeking damages in "a desperate attempt to shift blame" for Delta's own IT inadequacies having exacerbated its outage, unlike "other major airlines" that quickly resumed operations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.