Legacy infusion pumps commonly available for purchase on the secondary market often contain wireless authentication and other sensitive data that the original medical organization owners failed to purge, warned researcher Deral Heiland, citing a recent study conducted by security firm Rapid7.
India's data protection bill, which sets a maximum fine of $30 million for privacy violations, passed both houses of Parliament this week and awaits presidential approval to become the country's first data privacy law. Final changes eased data localization requirements for most companies.
Tampa General Hospital is facing at least three proposed federal class action lawsuits filed in recent days following the nonprofit Florida healthcare provider's disclosure late last month of a data theft incident that affected 1.3 million patients and employees.
Many security awareness training programs fail because organizations don't understand the risks they face, said Culture AI's John Scott. He said a successful training program "will help people by making sure that it's targeting the behaviors that address the key risks for the organization."
Citing several growing concerns, Sen. Mark Warner, D-Va., on Tuesday sent a letter quizzing Google CEO Sundar Pichai about how the tech giant is applying privacy, trust and ethical "guardrails" around the development and use of its generative AI product, Med-PaLM 2, in patient care settings.
Collaborative AI - the process of one AI model learning from another - is one of the most effective ways for financial institutions to fight the sophisticated techniques fraudsters use for scams, said Johan Gerber, executive vice president of security and cyber innovation at Mastercard.
Financial institutions globally have invested heavily in anti-financial crimes strategies and tools that report potential risk to regulatory authorities. But so have their adversaries. David Stewart and Keith Swanson discuss how institutions are using AI/ML to create more effective fraud defenses.
A recently identified security vulnerability in PaperCut print management software holds the potential for high-severity outcomes and could let unauthorized hackers run code remotely. The software is used in a wide array of environments, including large printer fleets supporting over 100,000 users.
WatchGuard's presence on both the endpoint and network allows the company to accelerate response and remediation times on behalf of MSPs, CEO Prakash Panjwani said. MSPs can determine how much of the response they want WatchGuard to automate based on their level of sophistication.
In the latest weekly update, Troy Leach, chief strategy officer at Cloud Security Alliance, joins ISMG editors to discuss preparing for new regulations, new requirements for third-party cloud penetration testing, and the opportunities and risks of AI in the financial sector.
A ransomware attack has forced a California-based hospital chain to divert ambulances from its emergency rooms and cancel appointments for services. The group of 17 hospitals, 166 outpatient clinics and various doctor practices is still recovering after an IT systems shutdown.
Fortra has pursued acquisitions in the infrastructure protection, data protection, and digital risk and email protection markets to help customers improve security posture. CEO Kate Bolseth said clients told Fortra they had challenges within segments such as security awareness and managed services.
The U.S. government is urging computer manufacturers to improve the security of firmware architecture that boots up devices after a powerful bootkit sparked concerns over permanent malware infections. Among its recommendations are that all UEFI developers implement dedicated PKI for updates.
A five-year-old flaw in Fortinet SSL VPNs remains one of the world's most widely exploited vulnerabilities. So warn cybersecurity officials across the U.S. and its Five Eyes partners in a joint security advisory highlighting the 12 most exploited flaws that require immediate patching.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.