A threat actor who claims to have stolen 16 million customer records from HDFC Life is demanding a $6.9 million ransom to keep from selling it on the dark web. The stolen records of the Indian insurance giant are being advertised for sale beginning Dec. 6 for 200,000 Tether, or $200,000.
An insider breach at a Florida pain management firm and an email breach at a Colorado pediatric hospital have resulted in more than $1.7 million in fines for HIPAA violations found by federal investigators. The two incidents affected fewer than 50,000 people.
Simplify HIPAA compliance with Netskope's detailed mapping guide, connecting HIPAA security and privacy standards to advanced Netskope tools.
Protect electronic protected health information (ePHI) with actionable insights and tailored solutions.
Key Takeaways:
Map HIPAA requirements...
Three of the world's largest pure-play cybersecurity vendors recently reported earnings, grappling with SIEM and firewall displacement opportunities along with rebounding from a massive outage. Palo Alto Networks Continues to reap the benefits of buying IBM's QRadar SaaS business.
Ensure FERPA compliance with Netskope's comprehensive mapping guide, designed to simplify data governance and security for educational institutions.
This guide bridges FERPA recommendations with Netskope's cutting-edge solutions to protect student data effectively.
Key Takeaways:
...
CEO Anand Eswaran explains how Veeam's $2 billion secondary offering strengthens its financial position as the data resilience vendor prepares for an initial public offering. He discusses the company’s commitment to innovation and strategic pacts with Splunk, CrowdStrike and Palo Alto Networks.
Longtime Tenable CEO Amit Yoran is temporarily stepping aside for cancer treatment and recovery, with top deputies Stephen Vintz and Mark Thurmond stepping up to lead the organization. Yoran was diagnosed in March with a treatable form of cancer, but recently learned he needs additional treatment.
The U.S. Department of Homeland Security is reportedly expanding its use of emerging surveillance tools, including drones and artificial intelligence, without proper safeguards as experts warn of potential privacy violations and risks involving facial recognition and third-party data usage.
Two data brokers pledged to stop using geolocation data gleaned from smartphones to sell services that provide a window to the intimate lives of Americans. "Surreptitious surveillance by data brokers undermines our civil liberties," an U.S. Federal Trade Commission official said.
With over 32 years of experience spanning hardware, enterprise resource software, product development and analytics, Rahul Monie, CISO partner at CTO Bridge Solutions, has been center stage for the IT evolution from basic hardware and software to complex data analytics and cybersecurity technology.
Lennert Wouters, a researcher at KU Leuven University in Belgium, has spent the past eight years studying embedded security, analyzing the vulnerabilities of everyday devices and commercial products. He shares his greatest hacks and insights on hardware security industry trends.
In this episode of Information Security Media Group's monthly series, "Insights APAC," ISMG editors discuss the top cybersecurity developments from November, including Australia's social media ban, Chinese data protection audits and the latest fine against Meta by India.
Hackers can potentially use AI to manipulate data that's generated and shared by some health apps, diminishing the data's accuracy and integrity, said Sina Yazdanmehr and Lucian Ciobotaru of cybersecurity firm Aplite, describing a recent research project involving Google Health Connect.
According to Gartner, “The perimeter security paradigm led organizations to assume that entities were secure within a network protected by perimeter controls designed to keep the “bad guys” out.
However, attackers took advantage of the assumption that an internal IP address was enough to allow...
As former director of information security and privacy at Sonesta Hotels, Michael Woodson championed a proactive approach to cybersecurity. His leadership philosophy underscores the importance of cultural transformation and continuous learning in building robust security programs.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.