A breakthrough star in Forrester's latest vulnerability risk management rankings hauled in $34 million to expand into the cyber risk and attack path management markets. The Series B extension funding will allow Vulcan Cyber to go beyond legacy vulnerability management and take on ASPM.
The vast range of questionnaires used in the current third-party assessment process make the process ineffective because the questionnaires typically do not give the context required for specific organizations with unique needs, according to Darshan Lakha, head of cybersecurity at Vodacom Group.
A Senate committee discussed potential sanctions and enforcement measures to ensure governments around the world obey international norms for artificial intelligence systems, after State Department officials warned foreign adversaries will not comply with U.S. guidelines for responsible AI use.
The number of healthcare organizations and patients affected by a recent data theft at medical transcription firm Perry Johnson & Associates is expanding: The company now says the breach affected the sensitive information of about 9 million people.
A key European parliamentary committee on Tuesday voted to carve off encrypted communications from a legislative proposal directing online providers to diminish the risk of child sexual abuse material. The European Parliament's LIBE Committee emphatically rejected weakening end-to-end encryption.
In partnership with the Cyentia Institute, Rockwell Automation analyzed cybersecurity events involving compromised OT/ICS, taking a deep dive into the origin and history of those events, as well as the OT implications.
The risk of critical infrastructure hacking in the United Kingdom likely grew in the last year, says the national cybersecurity agency, citing a slew of high-profile ransomware attacks. Russia's invasion of Ukraine is a main driver of growing risk in cyberspace, the agency says.
1touch.io tapped longtime Bugcrowd leader Ashish Gupta as its next CEO to help the data intelligence startup address proactive use cases around data-enabled processes. Gupta will continue building out 1touch's workflows and processes around data discovery, classification, privacy and compliance.
A virtual pharmacy and mail-order prescription drug firm is notifying about 2.36 million patients of a hacking incident that compromised their sensitive information. In the past week, attorneys have filed at least six proposed federal class action lawsuits related to the breach.
AI-generated attacks can be faster and more adaptable than human-led attacks. Organizations can defend against AI-powered attacks by educating their users, creating policies and using AI-powered security tools, said Vlad Brodsky, chief information security officer at OTC Markets Group.
In today's hyper-connected world, telecommunication service providers play a pivotal role in ensuring seamless communication, data transfer and collaboration for businesses. But the evolving threat landscape of cybersecurity continues to pose significant challenges, which Ian Keller discusses.
The U.S. Cybersecurity and Infrastructure Security Agency has released a road map for artificial intelligence after an October executive order tasked the Department of Homeland Security with assisting federal agencies and the private sector in the safe development and deployment of new AI systems.
Info-stealer malware built for stealing lucrative, sensitive data - including cryptocurrency wallet and remote access credentials - continues to remain popular for criminally inclined individuals. Researchers reports that RedLine, LokiBot, Mars and Aurora remain attackers' top info-stealer choices.
McLaren Health Care is notifying nearly 2.2 million people of a data breach weeks after ransomware group Alphv/BlackCat claimed to have stolen 6 terabytes of patient records in a recent attack. In the meantime, the number of lawsuits filed against McLaren related to the incident continues to climb.
Critical infrastructure operators across Denmark experienced the most extensive cybersecurity incident in Danish history earlier this year when hackers exploited zero-day vulnerabilities in firewalls meant to protect their networks from attacks, according to a new report published by SektorCERT.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.