The U.S. Cybersecurity and Infrastructure Security Agency has released a new plan to further align federal cybersecurity operations that experts say will likely face significant implementation roadblocks due to a lack of funding, leadership buy-in and technical resources.
While cyberthreats facing healthcare continue to evolve, security leaders must juggle a variety of cyber and related tech challenges, said Shawn Parker and Quincy Raybon, IT leaders at two elder medical care providers, and Ram Vaidyanathan of security firm ManageEngine.
The healthcare sector is plagued by increasingly complex cyberthreats, and simply meeting compliance standards is not doing enough to protect sensitive healthcare data, according to Christopher Frenz, assistant vice president of IT security at Mount Sinai South Nassau.
China's cyberespionage campaigns, viewed as an extension of the communist regime's wider geopolitical moves, rely on civilian hackers from domestic security firms for much of their success. Researchers say these groups face off in intense rivalries for lucrative government contracts.
John F. Banghart has spent 30 years in cybersecurity, and he appreciates the importance of creative thinking, upskilling and collaboration. Looking back on the Heartbleed vulnerability, Banghart said the incident demonstrates the need to address software supply chain risks causing problems today.
The U.K. Payment Systems Regulator wants to reduce the reimbursement cap on authorized push payment fraud to ease the burden on smaller banks. That's unacceptable and would undermine the financial system's integrity, said Jonathan Frost, board member at the Stop Scams Alliance.
Authentication requiring stored credentials is not only vulnerable to phishing and other compromises, but using these credentials can also be cumbersome for busy clinicians, said Tina Srivastava, co-founder of Badge, a provider of deviceless, tokenless authentication technology.
The Space Force is suffering from years of delays, setbacks and shortcomings in its Global Positioning System modernization program, according to a Government Accountability Office report, which found major deficiencies and testing issues that could hinder the United States competitiveness in space.
Rural and small hospitals and other healthcare providers often complain that a lack of resources is a major factor stunting their cybersecurity maturity. But even when offered free or discounted cyber assistance, many of these organizations aren't signing up.
Election security experts told Information Security Media Group the United States continues to lack adequate federal funding and resources to support state and local election information technology security efforts amid heightened global tensions and an ever-expanding threat landscape.
Geopolitical tensions have heightened cross-border fraud, with criminals exploiting technological advances and regulatory gaps between countries. Shilpa Arora, head of anti-financial crime products at ACAMS, discusses ways banks can tackle cross-border fraud schemes.
George Chacko, executive director of information security and compliance at New York Blood Center, shares his journey in cybersecurity, the challenges for nonprofit organizations with limited budgets and resources, and collaborative initiatives to improve security programs.
An AI-powered virtual care provider's unsecured database allegedly exposed thousands of sensitive mental health and substance abuse treatment records between patients and their counselors on the internet - where they were available to anyone, said the security researcher who discovered the trove.
Healthcare organizations often face obstacles in sharing cybersecurity information. Phil Englert and Errol Weiss from Health-ISAC advocate for shifting the focus from legal risks to business risks, improving incident response and building resilience through collaboration and transparency.
The U.S. federal government is preparing to collect reports from foundational artificial intelligence model developers, including details about their cybersecurity defenses and red-teaming efforts. The Department of Commerce said it wants thoughts on how data should be safety collected and stored.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.