The Change Healthcare attack - the most disruptive cyber incident to ever hit the U.S. healthcare ecosystem - spotlights the risks that come from relying on a handful of major suppliers, said leaders of the Health Information Sharing and Analysis Center.
The U.S. Cybersecurity and Infrastructure Security Agency posted to the Federal Register its proposed rule-making aimed at implementing a 72-hour reporting requirement for covered critical infrastructure entities as required under the Cyber Incident Reporting for Critical Infrastructure Act of 2022.
The widespread advent of artificial intelligence is opening a fraud detection capability gap between large and small financial institutions, the U.S. Department of the Treasury warns, suggesting that it may use its own historical data to narrow the divide.
The U.S. National Telecommunications and Information Administration released a report Wednesday calling for improved transparency into high-risk artificial intelligence systems, as well as independent audits that can help hold AI developers accountable.
As thousands of hospitals, clinics and doctor practices potentially have to notify millions of patients about the Change Healthcare breach, the American Hospital Association said the IT services firm and parent company, UnitedHealth Group, should be the sole sender of notifications.
Recognizing the increasing interconnectedness of global markets and the inherent vulnerabilities posed by technology, regulators worldwide are emphasizing the imperative for comprehensive approaches such as DORA. Financial institutions are urged to adopt a proactive stance, acknowledging that disruptive events are a...
A nursing home operator is seeking bankruptcy protection, citing the effects of a ransomware attack last fall and fallout from the recent Change Healthcare outage as factors that contributed to its financial woes. Also, a Senate bill aims to address cash flows for some health firms hit by an attack.
Artificial intelligence technologies such as generative AI are not helping fraudsters create new types of scams. They are doing just fine relying on the traditional scams, but the advent of AI is helping them scale up attacks and snare more victims, according to researchers at Visa.
Revenue cycle management firm MedData has agreed to a $7 million settlement in a class action lawsuit filed after an employee inadvertently uploaded and exposed the health and personal information of about 136,000 individuals on the public-facing part of GitHub for more than a year.
In the latest "Proof of Concept," panelists Sam Curry of Zscaler and Heather West of Venable LLP discuss the crucial role of explainability and transparency in artificial intelligence, especially in areas such as healthcare and finance, where AI decisions can significantly affect people's lives.
The current use of artificial intelligence in the U.K. defense sector is not about creating killer robots. It is focused on optimizing resources and increasing the efficiency of military operations, experts speaking at the Alan Turing Institute's AI UK conference told attendees.
The House voted Wednesday to pass the Protecting Americans' Data from Foreign Adversaries Act, a bill that would provide the FCC with enhanced authorities to seek up to $50,000 in civil penalties against data brokers that sell Americans' sensitive information to countries such as Russia and China.
Federal authorities are warning healthcare and public health sector entities of email bomb attacks, a type of denial-of-service attack that can overwhelm email systems and networks and distract victims from other nefarious activities. The incidents can also disrupt clinical and business workflow.
Fraudsters increasingly focus on synthetic entity fraud because forming a corporation requires few verification checks. This lack of rigorous verification by business registrars has led to an explosion in fake companies, said Andrew La Marca at Dun & Bradstreet.
As quantum computing looms, experts emphasize the urgency of embracing quantum-safe strategies. They highlight the need for proactive measures to protect digital assets from future breaches, deliver long-term data security and ensure the integrity of encryption.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.