In the latest "Proof of Concept," panelists Sam Curry of Zscaler and Heather West of Venable LLP discuss the crucial role of explainability and transparency in artificial intelligence, especially in areas such as healthcare and finance, where AI decisions can significantly affect people's lives.
Companies want the freedom to choose the best technology for their needs for both today and tomorrow. Having this flexibility means no restrictions on what’s possible with any technology you integrate with, and more possibilities to move fast, execute on complex use cases, and accelerate transformation. No one wants...
Over 95% of Fortune 500
companies use Azure, and Microsoft
reported a 30% year-over-year
increase in Azure revenue in the
second quarter of fiscal 2024.
Cloud migration also brings new complexity, which
can hamper the visibility of applications, which in
turn can lead to issues maintaining a strong...
Federal authorities are warning healthcare and public health sector entities of email bomb attacks, a type of denial-of-service attack that can overwhelm email systems and networks and distract victims from other nefarious activities. The incidents can also disrupt clinical and business workflow.
Major technology vendors keep being hacked by the nation-state hacking group Midnight Blizzard. Essential defenses to combat such attacks begin with implementing log monitoring across multiple platforms to find red flags, said John Fokker, head of threat intelligence at Trellix.
As quantum computing looms, experts emphasize the urgency of embracing quantum-safe strategies. They highlight the need for proactive measures to protect digital assets from future breaches, deliver long-term data security and ensure the integrity of encryption.
Data breach blast from the past: Data pertaining to 70 million individuals that the ShinyHunters gang claimed were AT&T customers has been leaked via a hacking forum, three years after criminals first offered it for sale. AT&T said the information didn't appear to have been stolen from its systems.
A spokesperson for the International Monetary Fund confirmed in a statement to ISMG on Monday that the global economic organization is investigating a February cyber incident that compromised 11 email accounts, all of which have since been re-secured.
A Mississippi women's health clinic has filed a proposed class action lawsuit against UnitedHealth Group alleging the disruption in claims processing caused by the cyberattack on the company's Change Healthcare unit and the resulting IT outage is threatening to push the practice into bankruptcy.
Amazon Web Services hired Gee Rittenhouse to help organizations protect their data and applications in the cloud. Rittenhouse spent more than two years atop San Jose, California-based security service edge vendor Skyhigh and prior to that, more than three years leading Cisco's cybersecurity unit.
Learn how to streamline your security operations and enhance efficiency with this IDC comprehensive guide, "The RX for Tool Sprawl in the SOC: A Cybersecurity Rationalization Life Cycle."
Simplify Security Operations: Understand the importance of consolidating tools and vendors to reduce complexity and...
Wiz is reportedly set to buy centralized cloud threat management vendor Gem Security for $350 million, Bloomberg reported this week. The deal would come just four months after Wiz made its first-ever acquisition, scooping up cloud-based development platform Raftt for as much as $50 million.
In the aftermath of a ransomware attack several years ago, Hackensack Meridian Health embarked on transforming its cybersecurity program with the support of top leadership and increased funding and staff and by implementing critical security tools and best practices, said CISO Mark Johnson.
Advanced attackers increasingly feel the need for speed, lowering the time they spend lurking after they infiltrate networks before exfiltrating data and crypto-locking systems, experts warn in a review of top hacking strategies seen in 2023. Cue challenges for defenders.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.