Tag: healthcare
-
Transfer learning and governance help bridge healthcare AI divide
Singapore researchers show how adapting pre-trained AI models can solve data scarcity issues in countries with limited resources. Separately, they have proposed forming an international consortium to build consensus on AI governance in medicine First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366637650/Transfer-learning-and-governance-help-bridge-healthcare-AI-divide
-
How does Agentic AI reduce risks in digital environments?
What Makes Non-Human Identities (NHIs) Vital for Cloud Security? Where businesses increasingly shift operations to the cloud, how can they ensure robust security while managing machine identities? Non-Human Identities (NHIs) offer a promising solution, playing a pivotal role in safeguarding digital environments from potential risks. Businesses across various sectors, from healthcare to financial services, are……
-
Can compliance automation keep regulators satisfied?
How Can Organizations Meet the Challenges of Compliance Automation? What are the key challenges businesses face when aiming to satisfy regulatory requirements through compliance automation? Managing non-human identities (NHIs) and secrets security in cloud environments is becoming increasingly important for businesses across various industries. Financial services, healthcare, travel, and DevOps teams are all seeking robust……
-
Report: Attacks ‘Cascade’ From IT, OT to Patient Care
Trellix Says Email, Identify Failures Are Among Top Vectors in Health Compromises. Of the millions of threats detected in healthcare IT environments last year, email phishing, identity failures and device vulnerabilities were among the top vectors for non-clinical IT compromises – often cascading and disrupting patient care, said a new report from security firm Trellix.…
-
When Hospitals Go Dark and Browsers Turn Rogue
At 6:32 a.m., a hospital in Belgium pulled the plug on its own servers. Something was already inside the network, and no one could say how far it had spread. By mid-morning, scheduled procedures were canceled. Critical patients were transferred out with help from the Red Cross. Staff went back to paper. Emergency services ran at reduced……
-
Interconnectedness, extortion risk make cybersecurity a healthcare C-suite priority
A new report from Trellix reviews the biggest breaches, describes the most effective defenses and profiles the most dangerous attackers. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/health-care-cybersecurity-threats-report-trellix/810608/
-
Can Agentic AI operate independently in high-stakes areas?
Can Independent Agentic AI Safeguard Our Critical Systems? Have you ever wondered how we can entrust critical operations to independent systems? The emergence of Agentic AI, with its capacity to operate autonomously, has sparked considerable discussion about its potential role in high-stakes environments. This intriguing technology has been deployed across various sectors, such as healthcare,……
-
Claroty Gets $150M to Lead in AI for Infrastructure Security
Claroty CEO Yaniv Vardi Outlines IPO Strategy and Growth Through Acquisition. Claroty’s $150 million Series F funding round will help scale its platform for protecting critical infrastructure with embedded AI. CEO Yaniv Vardi says the company aims to reach profitability, pursue M&A and strengthen verticalized offerings for the healthcare, manufacturing and industrial spaces. First seen…
-
CISO’s predictions for 2026
Tags: access, ai, attack, authentication, automation, breach, business, ciso, cloud, control, credentials, cryptography, cyber, cyberattack, cybersecurity, data, data-breach, encryption, endpoint, extortion, finance, governance, government, healthcare, identity, infrastructure, malicious, mobile, mssp, network, password, penetration-testing, ransomware, risk, router, saas, soc, strategy, supply-chain, technology, threat, tool, vulnerability, warfareAI agents to reshape the threat landscape: But those same AI technologies are also changing the threat landscape. Toal points to a recent Anthropic report that documented the first large-scale AI-enabled cyberattack as an early warning sign. “I guarantee attackers will be more focused on using AI agents for what they want than a lot…
-
How to scale NHIs safely and efficiently?
Is Your Organization Ready to Scale NHIs Safely and Efficiently? Scaling Non-Human Identities (NHIs) is a complex endeavor, particularly in dynamic industries such as financial services, healthcare, and technology-driven sectors that rely heavily on cloud computing. Where NHIs serve as the backbone for automation, the question becomes: how can organizations use NHI management to achieve……
-
Securing the Future: Practical Approaches to Digital Sovereignty in Google Workspace
Tags: access, attack, ciso, cloud, compliance, computing, container, control, data, defense, dora, email, encryption, GDPR, google, Hardware, healthcare, identity, infrastructure, law, malware, network, privacy, regulation, resilience, risk, service, software, strategy, zero-trustSecuring the Future: Practical Approaches to Digital Sovereignty in Google Workspace madhav Thu, 01/22/2026 – 04:35 In today’s rapidly evolving digital landscape, data privacy and sovereignty have become top priorities for organizations worldwide. With the proliferation of cloud services and the tightening of global data protection regulations, security professionals face mounting pressure to ensure their…
-
13 cyber questions to better vet IT vendors and reduce third-party risk
Tags: access, api, attack, authentication, automation, best-practice, breach, business, ceo, ciso, cloud, compliance, control, credentials, credit-card, cyber, cyberattack, cybercrime, cybersecurity, data, detection, endpoint, exploit, extortion, firewall, healthcare, identity, incident response, infrastructure, insurance, international, ISO-27001, jobs, least-privilege, mfa, monitoring, network, nist, password, PCI, penetration-testing, radius, ransomware, risk, saas, sans, security-incident, service, supply-chain, threat, update, vpn, vulnerabilityVital vendor questions CISOs should ask: To gain that critical information, security leaders and experts recommend CSOs ask IT partners the following cyber-specific questions. 1. What attestation will you provide to prove proper security controls are in place? These are essential, says Juan Pablo Perez-Etchegoyen, CTO for cybersecurity and compliance platform Onapsis. Some of the…
-
13 cyber questions to better vet IT vendors and reduce third-party risk
Tags: access, api, attack, authentication, automation, best-practice, breach, business, ceo, ciso, cloud, compliance, control, credentials, credit-card, cyber, cyberattack, cybercrime, cybersecurity, data, detection, endpoint, exploit, extortion, firewall, healthcare, identity, incident response, infrastructure, insurance, international, ISO-27001, jobs, least-privilege, mfa, monitoring, network, nist, password, PCI, penetration-testing, radius, ransomware, risk, saas, sans, security-incident, service, supply-chain, threat, update, vpn, vulnerabilityVital vendor questions CISOs should ask: To gain that critical information, security leaders and experts recommend CSOs ask IT partners the following cyber-specific questions. 1. What attestation will you provide to prove proper security controls are in place? These are essential, says Juan Pablo Perez-Etchegoyen, CTO for cybersecurity and compliance platform Onapsis. Some of the…
-
Minnesota Agency Notifies 304,000 of Vendor Breach
State Monitoring Incident Involving a Health Entity Worker for Potential Fraud. The Minnesota Department of Human Services is notifying nearly 304,000 people of data breach involving someone at a healthcare provider who inappropriately accessed information from an IT system managed by a vendor. State officials are monitoring the incident for potential fraud. First seen on…
-
Top 10 HIPAA Compliance Software Solutions
Key Takeaways Healthcare breaches have cost an eye”‘watering $7.42 million per incident in 2025, and it’s not surprising that regulators are dialing up new requirements like multi”‘factor authentication, encryption for all ePHI, and yearly audits. Small practices may be able to get by with basic tools, but larger organizations need more robust systems. The best……
-
How proactive can AI be in secrets rotation processes
How Can Organizations Effectively Manage Non-Human Identities? Are you aware of the potential threats posed by machine identities in your organization? With cybersecurity professionals navigate the complexities of managing Non-Human Identities (NHIs), understanding the nuances of these machine identities becomes crucial. In domains such as financial services, healthcare, and travel, safeguarding NHIs and their associated……
-
HHS Urges Health Sector to Harden Security of PHI, Devices
Feds Pushing HIPAA Regulated Entities to Bolster Security Risk Management. Federal regulators are advising regulated healthcare firms and their third-party vendors to harden systems, software and medical devices to better safeguard protected health information. Hardening is a necessary measure for protecting data privacy security – but also in protecting patient safety. First seen on govinfosecurity.com…
-
Healthcare’s blind spot: What happens after our data is shared?
A recent healthcare lawsuit exposes how data governance breaks down once records leave the EHR, highlighting the risks of unstructured text in an AI-driven ecosystem. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/healthcares-blind-spot-what-happens-after-our-data-is-shared/
-
Cyber-stricken Belgian hospitals refuse ambulances, transfer critical patients
Attack enters second day with major disruption to healthcare provision First seen on theregister.com Jump to article: www.theregister.com/2026/01/14/belgium_hospital_cyberattack/
-
AZ Monica hospital in Belgium shuts down servers after cyberattack
A cyberattack hit AZ Monica hospital in Belgium, forcing it to shut down servers, cancel procedures, and transfer critical patients. A cyberattack forced Belgian hospital AZ Monica to shut down all servers, cancel scheduled procedures, and transfer critical patients. AZ Monica is a Belgian general hospital network operating two campuses in Antwerp and Deurne, providing…
-
Taiwan Endures Greater Cyber Pressure From China
Chinese cyberattacks on Taiwan’s critical infrastructure, including energy utilities and hospitals, rose 6% in 2025, averaging 2.63 million attacks a day. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/taiwan-sees-greater-cyber-pressure-from-china
-
Taiwan Endures Greater Cyber Pressure From China
Chinese cyberattacks on Taiwan’s critical infrastructure, including energy utilities and hospitals, rose 6% in 2025, averaging 2.63 million attacks a day. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/taiwan-sees-greater-cyber-pressure-from-china
-
Taiwan Endures Greater Cyber Pressure From China
Chinese cyberattacks on Taiwan’s critical infrastructure, including energy utilities and hospitals, rose 6% in 2025, averaging 2.63 million attacks a day. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/taiwan-sees-greater-cyber-pressure-from-china
-
Seceon Breaks the OT Security Barrier: aiSecOT360 Delivers Holistic Protection Without Compromising Air-Gap Integrity
As Nation-State Attacks Escalate Against Critical Infrastructure, Healthcare, and Manufacturing, AI/ML & DTM Powered Platform Unifies NG-SIEM, NDR, UEBA, NBAD, ITDR, and Threat Intelligence for Organizations with OT and Legacy Infrastructure BOSTON, Jan. 13, 2026 /PRNewswire/, With cyberattacks against critical infrastructure surging 30% in 2025 and nation-state actors like Volt Typhoon and Salt Typhoon actively pre-positioning within…
-
Cybersecurity risk will accelerate this year, fueled in part by AI, says World Economic Forum
Tags: ai, attack, automation, business, ceo, ciso, control, country, cryptography, cyber, cybercrime, cybersecurity, data, detection, exploit, finance, framework, fraud, governance, healthcare, incident, infrastructure, international, middle-east, phishing, ransomware, resilience, risk, service, skills, software, strategy, supply-chain, technology, threat, tool, vulnerabilityAI is anticipated to be the most significant driver of change in cybersecurity in 2026, according to 94% of survey respondents;87% of respondents said AI-related vulnerabilities had increased in the past year. Other cyber risks that had increased were (in order) cyber-enabled fraud and phishing, supply chain disruption, and exploitation of software vulnerabilities;confidence in national cyber…
-
Central Maine Healthcare breach exposed data of over 145,000 people
A data breach last year at Central Maine Healthcare (CMH) exposed sensitive information of more than 145,000 individuals. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/central-maine-healthcare-breach-exposed-data-of-over-145-000-people/
-
Belgian hospital AZ Monica shuts down servers after cyberattack
Belgian hospital AZ Monica was forced to shut down all servers, cancel scheduled procedures, and transfer critical patients earlier today due to a cyberattack. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/belgian-hospital-az-monica-shuts-down-servers-after-cyberattack/
-
Healthcare breaches double as shadow AI, vendor risks proliferate
A new report paints a picture of a sector with limited confidence in its defensive capabilities. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/healthcare-cyber-breaches-fortified/809483/

