Information Security Media Group's Fraud, Security and Risk Management Summit brought together a diverse group of cybersecurity leaders and experts in New York City for a comprehensive day of education and collaboration on payment fraud, identity theft and third-party risk management.
A coalition of cyber insurance associations has pledged to back fresh government cybersecurity guidance designed to help victims avoid ever paying a ransom as part of an ongoing push to reduce ransomware's profitability for criminals, in part by improving organizations' resilience and recovery.
Nation-state attackers apparently backdoored widely used, open-source data compression software as part of a supply chain attack. Malicious code inserted into recent versions of XZ Utils was designed to facilitate full, remote access to an infected system.
Business leaders and security leaders agree on
the importance of cybersecurity, but there are
significant differences in how the two groups
perceive and prioritize the threats and view the
role of the other party.
In this videocast interview, Theo Zafirakos, CISO, Terranova Security, provides expert analysis of the "Securing Your Third-Party Supply Chain in 2024 Survey" results, including a deep dive into the core conclusions, including the core detriments of poor visibility of cybersecurity awareness, and how to better...
Experience this captivating interview featuring David Bradley, Vice President of Consulting Services at Clearwater Security, as he provides in-depth analysis on the current state of generative AI trends in the healthcare industry.
The New York Times is suing OpenAI and its chief backer Microsoft for copyright infringement, alleging that OpenAI used without permission "millions" of its copyrighted articles to train the large language models used by ChatGPT and by extension Bing Chat and Copilot.
By the numbers, who has implemented GenAI in their organization? Who has a dedicated budget? And who understands the AI regulations for their industry? An expert panel discusses the findings of ISMG's First Annual Generative AI Study: Business Rewards vs. Security Risks.
Compromised mobile apps can be an open door to critical
enterprise app servers and other back-end systems,
and this survey aims to shine a light on a potential hole in
most enterprise security walls – exposing potential gaps in
CISO awareness.
When it comes to cloud security in financial services, this expert panel agrees: What you don't know can hurt you. Learn of new "security by design" strategies and solutions from Vice President Erika Voss, Ph.D.; Alicja Cade of Google Cloud; and Anthony Belfiore from Wiz.
Varonis CEO Yaki Faitelson is fond of saying "You can't unbreach data." In this interview, he discusses generative AI, as well as other technologies and trends and how they impact the ways enterprises view and secure their most critical data.
Join us to learn from Cisco about what new, modern and sophisticated threats look like today, and how these complex threats make it harder to succeed at effective threat detection and response
Researchers discovered an undocumented backdoor being used by the North Korean Lazarus Group to target a Spanish aerospace company. The attacker masqueraded as a Meta recruiter and tricked the victim into downloading and executing malicious files on a company device.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.