Tag: healthcare
-
Emulating the Prominent Global Group Ransomware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by Global Group ransomware, a threat that first appeared in June 2025 and quickly became notorious across the security landscape. The group has primarily targeted high-impact sectors such as healthcare, manufacturing, and professional services, where operational downtime can cause severe disruption. First seen…
-
There’s no such thing as quantum incident response and that changes everything
Tags: apple, attack, china, compliance, computer, cryptography, data, dns, encryption, finance, group, healthcare, incident response, Internet, linkedin, nist, PCI, risk, serviceStep one: Inventory your algorithms and data with a view towards which sensitive data ought to be protected with PQC. This is a data classification exercise where you need to add a column to track whether the datastore or application qualifies for PQC.Step two: Check your internet-facing assets to see which, if any, are already…
-
There’s no such thing as quantum incident response and that changes everything
Tags: apple, attack, china, compliance, computer, cryptography, data, dns, encryption, finance, group, healthcare, incident response, Internet, linkedin, nist, PCI, risk, serviceStep one: Inventory your algorithms and data with a view towards which sensitive data ought to be protected with PQC. This is a data classification exercise where you need to add a column to track whether the datastore or application qualifies for PQC.Step two: Check your internet-facing assets to see which, if any, are already…
-
There’s no such thing as quantum incident response and that changes everything
Tags: apple, attack, china, compliance, computer, cryptography, data, dns, encryption, finance, group, healthcare, incident response, Internet, linkedin, nist, PCI, risk, serviceStep one: Inventory your algorithms and data with a view towards which sensitive data ought to be protected with PQC. This is a data classification exercise where you need to add a column to track whether the datastore or application qualifies for PQC.Step two: Check your internet-facing assets to see which, if any, are already…
-
Coming AI regulations have IT leaders worried about hefty compliance fines
Tags: ai, cio, compliance, control, data, gartner, governance, healthcare, intelligence, law, regulation, risk, software, technology, tool, training, usaCIOs on the forefront: With US states and more countries potentially passing AI regulations, CIOs are understandably nervous about compliance as they deploy the technology, says Dion Hinchcliffe, vice president and practice lead for digital leadership and CIOs, at market intelligence firm Futurum Equities.”The CIO is on the hook to make it actually work, so…
-
Coming AI regulations have IT leaders worried about hefty compliance fines
Tags: ai, cio, compliance, control, data, gartner, governance, healthcare, intelligence, law, regulation, risk, software, technology, tool, training, usaCIOs on the forefront: With US states and more countries potentially passing AI regulations, CIOs are understandably nervous about compliance as they deploy the technology, says Dion Hinchcliffe, vice president and practice lead for digital leadership and CIOs, at market intelligence firm Futurum Equities.”The CIO is on the hook to make it actually work, so…
-
Coming AI regulations have IT leaders worried about hefty compliance fines
Tags: ai, cio, compliance, control, data, gartner, governance, healthcare, intelligence, law, regulation, risk, software, technology, tool, training, usaCIOs on the forefront: With US states and more countries potentially passing AI regulations, CIOs are understandably nervous about compliance as they deploy the technology, says Dion Hinchcliffe, vice president and practice lead for digital leadership and CIOs, at market intelligence firm Futurum Equities.”The CIO is on the hook to make it actually work, so…
-
The Human Cost of Cyber Risk: How Exposure Management Can Ease Security Burnout
Tags: ai, attack, breach, business, ceo, ciso, cloud, cve, cyber, cybersecurity, data, data-breach, defense, finance, fraud, healthcare, identity, mitre, ransomware, risk, strategy, technology, threat, tool, vulnerability, vulnerability-managementThe true cost of cyber risk is a human one. Siloed tools and disjointed operations aren’t just endangering your business, they’re also taking a real toll on your teams. It’s long past time to take the friction out of cybersecurity with a unified, proactive approach. Key takeaways: Security teams are overwhelmed by the number of…
-
The Human Cost of Cyber Risk: How Exposure Management Can Ease Security Burnout
Tags: ai, attack, breach, business, ceo, ciso, cloud, cve, cyber, cybersecurity, data, data-breach, defense, finance, fraud, healthcare, identity, mitre, ransomware, risk, strategy, technology, threat, tool, vulnerability, vulnerability-managementThe true cost of cyber risk is a human one. Siloed tools and disjointed operations aren’t just endangering your business, they’re also taking a real toll on your teams. It’s long past time to take the friction out of cybersecurity with a unified, proactive approach. Key takeaways: Security teams are overwhelmed by the number of…
-
New York Hospitals Are Facing Tougher Cyber Rules Than HIPAA
State cybersecurity regulations that apply to some hospitals in New York state go well compliance under the federal HIPAA security rule, posing expanded data governance challenges for providers, said Matthew Bernstein of consulting firm Bernstein Data. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/new-york-hospitals-are-facing-tougher-cyber-rules-than-hipaa-i-5498
-
New York Hospitals Are Facing Tougher Cyber Rules Than HIPAA
State cybersecurity regulations that apply to some hospitals in New York state go well compliance under the federal HIPAA security rule, posing expanded data governance challenges for providers, said Matthew Bernstein of consulting firm Bernstein Data. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/new-york-hospitals-are-facing-tougher-cyber-rules-than-hipaa-i-5498
-
New York Hospitals Are Facing Tougher Cyber Rules Than HIPAA
State cybersecurity regulations that apply to some hospitals in New York state go well compliance under the federal HIPAA security rule, posing expanded data governance challenges for providers, said Matthew Bernstein of consulting firm Bernstein Data. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/new-york-hospitals-are-facing-tougher-cyber-rules-than-hipaa-i-5498
-
Pharmacy Cybersecurity Without Compromise: Reducing Costs and Protecting Patient Data at Scale
Tags: ai, attack, automation, cloud, cybersecurity, data, defense, healthcare, iot, ransomware, zero-trustThe Days of Fragmented Cybersecurity Are Over Pharmaceutical and healthcare organizations face unprecedented cybersecurity challenges. With cloud adoption, IoT expansion, digital pharmacies, and rising ransomware attacks, the old approach of layering dozens of point solutions no longer works. Traditional perimeter defenses and multi-vendor setups create complexity, high costs, and blind spots. Zero Trust, AI-driven automation,…
-
SimonMed Data Breach Exposes Sensitive Information of 1.2 Million Patients
SimonMed Imaging has confirmed that an external hacking incident compromised the personal data of 1,275,669 patients, making it one of the largest healthcare breaches of the year. The breach, which occurred on January 21, 2025, but was not discovered until January 28, exposed names and other personal identifiers. Written notifications were sent to affected individuals…
-
SimonMed Imaging discloses a data breach impacting over 1.2 million people
Medusa ransomware hit SimonMed Imaging, stealing 200 GB of data and impacting over 1.2 million people in a major healthcare data breach. SimonMed Imaging suffered a ransomware attack by the Medusa group, which claimed to have stolen 200 GB of data. SimonMed Imaging is one of the largest outpatient medical imaging providers in the U.S.,…
-
Building a healthcare cybersecurity strategy that works
In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity strategy, even when resources are tight. He … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/13/wayman-cummings-ochsner-health-building-healthcare-cybersecurity-strategy/
-
Building a healthcare cybersecurity strategy that works
In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity strategy, even when resources are tight. He … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/13/wayman-cummings-ochsner-health-building-healthcare-cybersecurity-strategy/
-
When hackers hit, patient safety takes the fall
93% of U.S. healthcare organizations experienced at least one cyberattack in the past year, with an average of 43 incidents per organization, according to Proofpoint. The … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/13/report-cyberattacks-disrupt-patient-care/
-
When hackers hit, patient safety takes the fall
93% of U.S. healthcare organizations experienced at least one cyberattack in the past year, with an average of 43 incidents per organization, according to Proofpoint. The … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/13/report-cyberattacks-disrupt-patient-care/
-
Driving Innovation with Secure NHIs
How Are Non-Human Identities Shaping the Future of Cybersecurity? What happens when machines need their own form of identification? This question is increasingly relevant as we dive deeper of Non-Human Identities (NHIs), which are revolutionizing the way organizations handle cybersecurity. In industries ranging from financial services to healthcare, and even in areas like travel and……
-
Driving Innovation with Secure NHIs
How Are Non-Human Identities Shaping the Future of Cybersecurity? What happens when machines need their own form of identification? This question is increasingly relevant as we dive deeper of Non-Human Identities (NHIs), which are revolutionizing the way organizations handle cybersecurity. In industries ranging from financial services to healthcare, and even in areas like travel and……
-
ALN, Octapharma Plasma Agree to Settle Breach Lawsuits
2 Firms Hit by Separate 2024 Attacks to Pay Total of $6.5M in Class Action Claims. A Nebraska-based revenue cycle management firm and a Swiss-based blood products manufacturer with plasma collection centers in the United States are the latest healthcare sector companies agreeing to pay multimillion dollar lawsuit settlements for two separate 2024 hacks affecting…
-
ISMG Editors: How the US Federal Shutdown Exposes Cyber Gaps
Also: Shutdown’s Ripple Effects on Healthcare, Mounting Threats to Aging OT Systems. In this week’s update, four ISMG editors discussed the fallout from the U.S. federal shutdown and the impact on state and regional cyber offices, the knock-on effects for healthcare, and the growing cyberthreats facing aging operational technology environments. First seen on govinfosecurity.com Jump…
-
USENIX 2025: PEPR ’25 Breaking Barriers, Not Privacy: Real-World Split Learning Across Healthcare Systems
Creator, Author and Presenter: Sravan Kumar Elineni Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-breaking-barriers-not-privacy-real-world-split-learning-across-healthcare-systems/
-
Free Healthcare ‘Toolkit’ Ranks and Maps Third-Party Risk
Guide Helps Teams Prioritize, Recognizing Not All Vendors Pose Same Level of Risk. Third-party security risk is among the most complicated challenges facing the healthcare sector because of the wide variety of vendors involved and the critical products and services they provide. A new Health Sector Coordinating Council toolkit aims to help entities navigate those…
-
Free Healthcare ‘Toolkit’ Ranks and Maps Third-Party Risk
Guide Helps Teams Prioritize, Recognizing Not All Vendors Pose Same Level of Risk. Third-party security risk is among the most complicated challenges facing the healthcare sector because of the wide variety of vendors involved and the critical products and services they provide. A new Health Sector Coordinating Council toolkit aims to help entities navigate those…
-
Hospital Insider Breach Lasted 10 Years, Led to FBI Inquiry
Texas-Based Harris Health Says FBI Just Gave Green Light to Notify 5,000 Patients. Harris Health is contacting 5,000 patients about a breach involving a former employee who improperly accessed electronic health records for over a decade. The Texas health entity said it discovered and reported the incident four years ago to the FBI, which just…
-
Staying Ahead with Proactive NHI Security
How Do Non-Human Identities Impact Cybersecurity? With organizations increasingly adopt sophisticated technologies, the importance of securing Non-Human Identities (NHIs) grows ever more critical. But how can businesses ensure the safety of these machine identities? Understanding and managing these identities can provide considerable security leverage across various sectors, including financial services, healthcare, and more. Understanding Non-Human……
-
Are Your NHIs Capable Enough for New Threats?
Are Your Cybersecurity Measures Equipped to Handle the Unique Challenges of Non-Human Identities? Where cybersecurity threats evolve by the minute, are your cybersecurity measures truly robust enough to handle the increasing complexity of Non-Human Identities (NHIs)? The advent of cloud environments has redefined how organizations across financial services, healthcare, DevOps, and other industries manage their……
-
Stronger Oversight Needed as Healthcare Risks Multiply
The Edmund Group’s Adler on Managing Third- and Fourth-Party Risk in Healthcare. Healthcare organizations face growing risks from data distribution, vendor dependencies and global instability. Steven Adler, partner at The Edmund Group, discusses practical steps to strengthen vendor oversight and resilience. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/stronger-oversight-needed-as-healthcare-risks-multiply-a-29651

