India's stock brokers and depository participants must now report all cyberattacks and breaches to the Securities and Exchange Board of India within six hours of detection under a mandate implementing what is likely the world's tightest breach reporting timeline requirement.
Unemployment benefits websites across the United States are offline after a malware attack was detected at third-party vendor Geographic Solutions Inc. The vendor, which serves dozens of state labor departments, says no personally identifiable information has been affected by the attack.
Federal regulators issued health privacy guidance for medical providers and patients and promised to make privacy violations a top HIPAA enforcement priority in the wake of the U.S. Supreme Court overturning Roe v. Wade, the five-decade precedent that guaranteed nationwide access to abortion.
Ransomware-wielding criminals constantly refine their behavior and tactics to maximize the chance of a payday, and recently they have been implementing fresh strategies for monetizing stolen data, says Steve Rivers at threat intelligence firm Kela.
Fraudsters compromised debit card numbers and associated PINs, and possibly names and addresses, of an undisclosed number of Bank of the West customers. Unknown thieves installed skimmers in a "small number of ATMs," the bank's COO, Karl Werwath, tells ISMG.
Humana Business Information Security Officer Ankit Patel says the doctors, physician assistants and leaders that he deals with on a daily basis are laser-focused on providing care to patients and consider technology and security only as it relates to providing patient care.
Effective security and risk programs require not just domain mastery but making security accessible to boards of directors and senior officers, says Karin Höne, the group chief information security and risk officer of South Africa-based multinational Barloworld.
The U.S. Cybersecurity and Infrastructure Security Agency has begun issuing alerts about 56 flaws across operational technology equipment built by 10 different vendors. Researchers at Forescout Technologies say the flaws trace to poor design decisions by vendors.
The Ministry of Electronics and Information Technology, or MeitY, in late May issued a new draft of the National Data Governance Framework Policy. Dipti Shroff of Ugam Solutions, Anand Krishnan of DSCI and Shivangi Nadkarni of Arrka share their thoughts on the changes from the previous version.
Insurance claims being filed by ransomware victims are growing as criminals continue to hit businesses with crypto-locking malware. To avoid these claims, organizations can take a number of proven steps to better protect themselves, says Payal Chakravarty of Coalition.
in the Frost Radar™ US Healthcare Cybersecurity Market
More than 90% of all healthcare organizations reported at least one security breach over the last 3 years. Robust cybersecurity has become a top priority and an essential requirement for all C-level healthcare executives. The most crucial challenges related to...
As shown by a recent survey conducted by the Information Security Media Group (ISMG) in conjunction with Palo Alto Networks and Accenture, patient care has never been more dependent on technology than it is today. We rely on technology to save lives, improve patient outcomes, expand quality and continuity of care,...
Federal regulators have signaled plans to release video guidance on the "recognized security practices" they will consider when taking HIPAA enforcement actions against organizations. New audio telehealth guidance was also unveiled.
Organizations that work with or within the healthcare industry need to prioritize and manage security and privacy-related risk and compliance programs. As the global standard for safeguarding information, HITRUST delivers a scalable, prescriptive, and certifiable framework that enables organizations to demonstrate...
Learn how you can implement a Zero Trust strategy in a healthcare environment through the support of Palo Alto Networks. This guide focuses on the unique needs of the healthcare industry, such as:
Protecting sensitive data, such as electronic medical records and patient data;
Protecting medical devices;