Legacy medical gear continues to pose big cyber challenges to healthcare entities. A joint report by the Food and Drug Administration and MITRE Corp. emphasizes the importance of entities taking a consistent risk-based approach to managing these and other devices, said Jessica Wilkerson of the FDA.
Cyberspace aggression against Israel has intensified since the onset of war in the Gaza Strip, changing from online vandalism to attacks aimed at disruption and sowing fear, says Israel's cybersecurity agency. A prominent attack vector is phishing emails.
The National Institute of Standards and Technology is failing to provide adequate information about how it plans to award funding opportunities to research institutions and private organizations through a newly established Artificial Intelligence Safety Institute, according to a group of lawmakers.
The U.S. Department of Defense released a draft of a long-awaited proposed rule for the Cybersecurity Maturity Model Certification program that aims to simplify compliance, enhance public-private coordination and better protect sensitive information from cyberthreats.
Hackers are targeting Linux Secure Shell servers to install tools for port scanning and dictionary attacks to compromise other vulnerable servers, forming a network for cryptocurrency mining and distributed denial-of-service attacks, say researchers at AhnLab Security Emergency Response Center.
Cybersecurity professionals are driven to make the world a safer place. But this often comes at a personal cost, as CISO Don Gibson discovered. At the age of 44, the price of stress and long hours was unexpected heart surgery. “How you adapt to change can really help you going forward," he said.
Hacks on healthcare sector entities reached record levels in 2023 in terms of data breaches. But the impact of hacks on hospital chains, doctors' offices and other medical providers - or their critical vendors - goes much deeper than the exposure of millions of health records.
Explore the future of enterprise security as analysts foresee a shift to passwordless authentication, addressing the issues of cost, user experience, and vulnerability, in a concise video.
Ground control to the space industry: Take your static cybersecurity practices and upgrade them to a dynamic model. So says NASA's first-ever security best practices guide for space communications, part of an effort to make mission security requirements more accessible.
A Russian man accused by the U.S. of trafficking in a hacked database of online credentials will apparently evade American courts after the Russian government said it had succeeded in extraditing him. Russian prosecutors say Nikita Kislitsin faces charges related to an October 2022 hacking incident.
Senior analyst Alla Valente discusses Forrester's "Predictions 2024: Cybersecurity, Risk and Privacy" report, which outlines five predictions to help security, risk and privacy leaders prepare for the coming year. She also discusses the significance of governance and accountability in the use of AI.
Truveta is a collaborative effort whose members include dozens of the largest healthcare systems in the U.S. It helps life sciences companies apply AI to a trove of electronic health records data to develop new treatments and study their effectiveness, said the organization's CEO, Terry Myerson.
Marc Lueck, EMEA CISO at Zscaler, describes generative AI as the bridge between traditional AI and machine learning. He said it offers the ability to engage in humanlike conversations while tapping into vast data repositories and is both a powerful defense mechanism and a potential vulnerability.
All has not been quiet on the malicious cybersecurity front this year, thanks to constant cybercrime innovation, cyberattacks and cyberespionage, and malicious or inadvertent data breaches. Here are 12 notable incidents and trends of 2023 and their implications for the bigger cybersecurity picture.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.