Tag: healthcare
-
NDSS 2025 DLBox: New Model Training Framework For Protecting Training Data
Session 7D: ML Security Authors, Creators & Presenters: Jaewon Hur (Seoul National University), Juheon Yi (Nokia Bell Labs, Cambridge, UK), Cheolwoo Myung (Seoul National University), Sangyun Kim (Seoul National University), Youngki Lee (Seoul National University), Byoungyoung Lee (Seoul National University) PAPER DLBox: New Model Training Framework For Protecting Training Data Sharing training data for deep…
-
Are investments in Privileged Access Management justified by results
Are PAM Investments Justified in the Realm of Non-Human Identities? What makes investing in Privileged Access Management (PAM) truly worthwhile when we focus on the management of Non-Human Identities (NHIs)? While we navigate intricate cybersecurity, ensuring robust access controls has become imperative. The stakes are particularly high in industries such as financial services, healthcare, and……
-
Nearly 480,000 impacted by Covenant Health data breach
A cyberattack last year against the Catholic healthcare organization Covenant Health exposed the sensitive information of more than 478,000 people. First seen on therecord.media Jump to article: therecord.media/covenant-health-breach-qilin
-
Covenant Health data breach after ransomware attack impacted over 478,000 people
Covenant Health suffered a ransomware attack by the Qilin group in May 2025, compromising data of over 478,000 individuals. Covenant Health, Inc., based in Andover, Massachusetts, is a healthcare organization that provides medical services and patient care. Covenant Health operates hospitals, clinics, or related healthcare facilities in multiple states, including Massachusetts, Maine, New Hampshire, Pennsylvania,…
-
TriZetto Data Breach Triggers Class-Action Lawsuits Against Cognizant
Cognizant faces lawsuits after a prolonged TriZetto data breach exposed sensitive healthcare data. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/trizetto-data-breach-triggers-class-action-lawsuits-against-cognizant/
-
Cognizant Faces Multiple US Class-Action Lawsuits After TriZetto Data Breach
Cognizant Technology Solutions is facing a wave of legal challenges in the United States following a significant data breach at its subsidiary, TriZetto Provider Solutions (TPS). The IT services giant has been hit with at least three class-action lawsuits alleging that it failed to protect sensitive healthcare data and delayed notifying victims for nearly a…
-
Hospitals are drowning in threats they can’t triage
Healthcare is facing a rise in cyber threats driven by vulnerable medical devices, growing data exposure, and AI adoption. This article outlines the pressures, gaps, and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/01/02/ai-threats-in-healthcare/
-
Top Data Breaches of December 2025
December 2025 closed the year with several high-impact data breaches across retail, education, healthcare research, and telecom. These incidents were not driven by a single cause. Some stemmed from misconfigured… The post Top Data Breaches of December 2025 appeared first on Strobes Security. First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/12/top-data-breaches-of-december-2025/
-
When One Vulnerability Breaks the Internet and Millions of Devices Join In
The final weeks of 2025 did not arrive quietly. A single software flaw rippled across the internet, healthcare providers disclosed deeply personal data exposures, and millions of everyday devices quietly joined large scale attacks. As we step into 2026, the ColorTokens Threat Advisory brief captures the operating conditions security teams are already living in, where breaches are assumed, exploitation is fast,……
-
Tipps für CISOs, die die Branche wechseln wollen
Tipps für CISOs mit “Vertical-Switch-Ambitionen”.In der Außenperspektive sollte es für Menschen, die es zum Chief Information Security Officer gebracht haben, eigentlich kein Problem sein, die Branche zu wechseln. In der Realität stellen viele Sicherheitsentscheider allerdings regelmäßig fest, dass das Gegenteil der Fall ist: Wenn man einmal in einer bestimmten Branche tätig ist, gestaltet es sich…
-
NDSS 2025 Automated Data Protection For Embedded Systems Via Data Flow Based Compartmentalization
Tags: access, automation, breach, conference, data, exploit, firmware, Hardware, healthcare, Internet, network, tool, vulnerabilityNDSS 2025 – Automated Data Protection For Embedded Systems Via Data Flow Based Compartmentalization Session 7B: Trusted Hardware and Execution Authors, Creators & Presenters: Zelun Kong (University of Texas at Dallas), Minkyung Park (University of Texas at Dallas), Le Guan (University of Georgia), Ning Zhang (Washington University in St. Louis), Chung Hwan Kim (University of…
-
How impenetrable are secrets vaulting solutions
How Are Non-Human Identities Changing the Cybersecurity Landscape? What if the biggest vulnerability in your cybersecurity strategy was not a human error but a machine identity left unchecked? Secrets vaulting solutions are increasingly seen as critical components of impenetrable security strategies. In domains like finance, healthcare, travel, and more, the integration of Non-Human Identities (NHIs)……
-
Inside the Biggest Cyber Attacks of 2025
Tags: attack, breach, credentials, cyber, cybersecurity, finance, government, healthcare, incident, infrastructure, leak, saas, supply-chain2025 has emerged as one of the most disruptive years for cybersecurity, marked by unprecedented breach volumes, record-breaking credential leaks, and cascading supply-chain failures. Across just 12 months, cyber incidents have impacted governments, healthcare systems, financial institutions, SaaS providers, airlines, retailers, and critical infrastructure, proving that no industry or geography remains insulated. 2025 Global Cybersecurity……
-
How to stay ahead in managing NHIs effectively
Are you effectively addressing the cybersecurity challenges associated with Non-Human Identities (NHIs)? The management of Non-Human Identities (NHIs) has become a critical aspect of cybersecurity strategies. NHIs, or machine identities, are often overlooked despite being the backbone of secure digital operations. They play a pivotal role in industries like financial services, healthcare, and more. With……
-
Reducing Cyber, Privacy Risks in Healthcare Sector M&As
Healthcare sector mergers and acquisitions dramatically amplify cybersecurity and data privacy exposure for potential buyers and sellers, said attorney Jonian Rafti of law firm Proskauer. But there are critical steps entities can take to reduce those risks, he said. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/reducing-cyber-privacy-risks-in-healthcare-sector-mas-i-5513
-
Getting a Tighter Grip on Third-Party AI Risk in Healthcare
Third-party security threats remain one of the most critical risks facing the healthcare sector. But now the increasing use of artificial intelligence by vendors adds a new layer of third-party concerns, said independent consultant Rick Doten, former healthplan CISO at Centene Corp. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/getting-tighter-grip-on-third-party-ai-risk-in-healthcare-i-5512
-
How can proactive AI security prevent data breaches
Can Organizations Trust Proactive AI Security to Prevent Data Breaches? The management of Non-Human Identities (NHIs) is becoming essential for organizations operating across various sectors such as financial services, healthcare, and DevOps. It’s imperative to understand how NHIs, combined with proactive AI security measures, pave the way to a more secure digital environment, limiting the……
-
Why staying ahead with Agentic AI is crucial for business
How Can Non-Human Identities Enhance Business Security With Agentic AI? Where technology continuously evolves, how can businesses leverage advancements to solidify their security posture? The answer lies in understanding and managing Non-Human Identities (NHIs) within a secure cloud environment, especially with the help of Agentic AI. WITH industries such as financial services, healthcare, and even……
-
What features ensure scalability in secret management
How Can Organizations Achieve Scalability in Secret Management? Securing sensitive data in the cloud isn’t just about protecting against external threats. Have you considered the importance of effectively managing machine identities to maintain a scalable security infrastructure? With technology shapes the future of industries like financial services, healthcare, and travel, managing Non-Human Identities (NHIs) becomes……
-
Industry Continues to Push Back on HIPAA Security Rule Overhaul
Healthcare cyberattacks are on the rise, but industry organizations say the proposed changes to the security rules fall short of what’s needed. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/industry-oppose-hipaa-security-rule-overhaul
-
How AI Will Reshape Health Data Breach, Attack Trends
Healthcare data breaches are becoming more frequent but smaller in scale, targeting smaller entities and high-value credentials and records – and AI is reshaping both the attack landscape and fraud patterns, said Jim Van Dyke, senior principal of innovation at TransUnion. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/how-ai-will-reshape-health-data-breach-attack-trends-i-5511
-
Why outsourced cyber defenses create systemic risks
Tags: access, ai, attack, backdoor, breach, business, ciso, cloud, compliance, corporate, cyber, cybercrime, cybersecurity, data, defense, detection, dora, exploit, finance, framework, GDPR, governance, government, hacker, healthcare, infrastructure, law, malicious, monitoring, moveIT, msp, nis-2, ransomware, regulation, resilience, risk, software, strategy, supply-chain, threat, tool, vulnerability, zero-trustRisk categories of outsourced IT & cybersecurity: When you outsource, responsibility shifts, but accountability never leaves you. The risks fall into clear categories. Operational risks The most basic risk is fragile continuity. In 2017, British Airways outsourced parts of its IT operations. A system outage grounded flights worldwide. The vendor contract delivered savings, but it…
-
What tools empower secure AI operation
How Essential is Non-Human Identity Management in Today’s Cybersecurity Landscape? Non-Human Identities (NHIs) are increasingly becoming pivotal. How effectively are organizations managing these machine identities to ensure secure AI operation? This question echoes in the boardrooms of financial services, healthcare, travel industries, and many more. The management of NHIs and their secrets is a linchpin……
-
What tools empower secure AI operation
How Essential is Non-Human Identity Management in Today’s Cybersecurity Landscape? Non-Human Identities (NHIs) are increasingly becoming pivotal. How effectively are organizations managing these machine identities to ensure secure AI operation? This question echoes in the boardrooms of financial services, healthcare, travel industries, and many more. The management of NHIs and their secrets is a linchpin……
-
Preparing Healthcare Workers for Secure, Responsible AI Use
Preparing a healthcare workforce to responsibly engage with AI tools without over relying on automation or undermining human oversight will require awareness training akin to phishing exercises, said Skip Sorrels, field CTO and CISO at security firm Claroty. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/preparing-healthcare-workers-for-secure-responsible-ai-use-i-5510
-
Why Smart Glasses in Hospitals Are Not a Bright Idea
Smart eyewear such as Meta-AI Ray Ban glasses – which sport microphones, cameras and can connect to artificial intelligence – pose emerging patient privacy and other risks especially when worn in healthcare settings, said Garrett Zickgraf of consulting firm LBMC. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/smart-glasses-in-hospitals-are-bright-idea-i-5509
-
Cybersecurity Snapshot: Cyber Pros Emerge as Bold AI Adopters, While AI Changes Data Security Game, CSA Reports Say
Tags: advisory, ai, api, attack, awareness, business, cloud, compliance, control, credit-card, crime, crimes, crypto, cyber, cybersecurity, data, data-breach, defense, detection, exploit, finance, framework, google, governance, guide, healthcare, injection, intelligence, law, LLM, lockbit, malicious, metric, mitigation, monitoring, network, office, openai, ransom, ransomware, risk, risk-management, service, skills, sql, threat, tool, training, update, vulnerabilityFormerly “AI shy” cyber pros have done a 180 and become AI power users, as AI forces data security changes, the CSA says. Plus, PwC predicts orgs will get serious about responsible AI usage in 2026, while the NCSC states that, no, prompt injection isn’t the new SQL injection. And much more! Key takeaways Cyber…
-
Cybersecurity Snapshot: Cyber Pros Emerge as Bold AI Adopters, While AI Changes Data Security Game, CSA Reports Say
Tags: advisory, ai, api, attack, awareness, business, cloud, compliance, control, credit-card, crime, crimes, crypto, cyber, cybersecurity, data, data-breach, defense, detection, exploit, finance, framework, google, governance, guide, healthcare, injection, intelligence, law, LLM, lockbit, malicious, metric, mitigation, monitoring, network, office, openai, ransom, ransomware, risk, risk-management, service, skills, sql, threat, tool, training, update, vulnerabilityFormerly “AI shy” cyber pros have done a 180 and become AI power users, as AI forces data security changes, the CSA says. Plus, PwC predicts orgs will get serious about responsible AI usage in 2026, while the NCSC states that, no, prompt injection isn’t the new SQL injection. And much more! Key takeaways Cyber…
-
MedStar Health Notifying Patients of Data Theft Breach
Ransomware Gang Rhysida Leaks 3.7TB of Data Stolen From Maryland Hospital System. Maryland-based MedStar Health, which operates 10 hospitals, is notifying patients about a data theft incident affecting their personal information. Ransomware group Rhysida claims on its darkweb leak site to have 3.7 terabytes of MedStar’s data, including over 7 million pieces of patient data.…

