This Week Health

Interviews in Action

More
This Week Health is a series of IT podcasts dedicated to healthcare transformation powered by the community

What would you like to learn about today?

Error!
No 'SiteSearch360Widget' widget registered in this installation.

Latest Episodes
View All
Popular Episodes
R25 - Podcasts Category Filter-2
  • All
  • Leadership (729)
  • Emerging Technology (583)
  • Security (334)
  • Patient Experience (311)
  • Interoperability (310)
  • Financial (308)
  • Analytics (185)
  • Telehealth (178)
  • Clinician Burnout (172)
  • Digital (168)
  • AI (167)
  • Legal & Regulatory (146)
  • Cloud (92)
View All
In the News

The evolution of privilege: How to secure your organization in an era of escalating workforce privileges

April 22, 2024

Today's workplace complexities have blurred the lines between standard and privileged user accounts, with many non-administrative roles requiring access to sensitive data and applications. CyberArk's CEO, Matt Cohen, emphasizes that any identity can become privileged under certain circumstances, highlighting the shifting nature of cyber security threats. Hackers exploit outdated authentication methods, with over half of workforce identities having access to critical systems, according to CyberArk's Amita Potnis. This situation necessitates a move beyond traditional security measures to modern Identity and Access Management (IAM) solutions that enforce least privilege access and manage all user accounts, mitigating risks associated with elevated privileges. The article discusses various scenarios where regular users gain unintended privileges, and how attackers exploit these "privilege creeps." To combat these vulnerabilities, organizations are encouraged to implement stronger authentication protocols, such as Multi-Factor Authentication (MFA) and Single Sign-On (SSO), and adopt a zero-trust network model and AI-assisted IAM platforms to ensure secure and appropriate access.

The evolution of privilege: How to secure your organization in an era of escalating workforce privileges SC Magazine

Read More

MITRE says state hackers breached its network via Ivanti zero-days

April 22, 2024

In January 2024, MITRE Corporation reported a security breach instigated by a state-sponsored hacking group that exploited two zero-day vulnerabilities in Ivanti VPNs. The breach was initially detected due to unusual activity in an unclassified network environment used for research and development, prompting an immediate investigation. Although the breach did not compromise MITRE's core enterprise network or its affiliates, the attackers were able to maneuver through the network and access sensitive data by using sophisticated methods to bypass security measures, including multi-factor authentication. The incident has prompted notifications to impacted parties and collaborations with authorities as MITRE works to establish secure operational alternatives while advocating for improved cybersecurity defenses across the industry.

MITRE says state hackers breached its network via Ivanti zero-days Bleeping Computer

Read More

The rise of the chief AI officer

April 22, 2024

As companies increasingly integrate artificial intelligence into their operations, the role of Chief AI Officer (CAIO) is becoming more prevalent. This executive position is dedicated to overseeing and strategically deploying AI technology within a company. The responsibilities of a CAIO include ensuring AI alignment with corporate goals, managing AI projects, and navigating ethical considerations associated with AI use. This role is crucial as businesses seek to harness AI’s potential while addressing the complexities it introduces.

The rise of the chief AI officer Financial Times

Read More

Cisco Discloses High-Severity Vulnerability, Exploit Code Released

April 22, 2024

Cisco has disclosed and issued a patch for a high-severity vulnerability affecting the Integrated Management Controller in a range of devices, including UCS C-Series Rack Servers and 5000 Series Enterprise Network Compute Systems. This flaw, having an 8.8 out of 10 severity rating, could allow an authenticated, local attacker with at least read-only privileges to execute command injection attacks and gain root access. While Cisco reported no known instances of the vulnerability being exploited, code that could be used for such purposes has been made public. Customers are urged to apply the provided patches, as no alternative mitigations have been advised, and a wide spectrum of Cisco devices could be impacted if running vulnerable versions of the software with default configurations.

Cisco Discloses High-Severity Vulnerability, Exploit Code Released CRN

Read More

The evolution of privilege: How to secure your organization in an era of escalating workforce privileges

April 22, 2024

Today's workplace complexities have blurred the lines between standard and privileged user accounts, with many non-administrative roles requiring access to sensitive data and applications. CyberArk's CEO, Matt Cohen, emphasizes that any identity can become privileged under certain circumstances, highlighting the shifting nature of cyber security threats. Hackers exploit outdated authentication methods, with over half of workforce identities having access to critical systems, according to CyberArk's Amita Potnis. This situation necessitates a move beyond traditional security measures to modern Identity and Access Management (IAM) solutions that enforce least privilege access and manage all user accounts, mitigating risks associated with elevated privileges. The article discusses various scenarios where regular users gain unintended privileges, and how attackers exploit these "privilege creeps." To combat these vulnerabilities, organizations are encouraged to implement stronger authentication protocols, such as Multi-Factor Authentication (MFA) and Single Sign-On (SSO), and adopt a zero-trust network model and AI-assisted IAM platforms to ensure secure and appropriate access.

The evolution of privilege: How to secure your organization in an era of escalating workforce privileges SC Magazine

Read More

MITRE says state hackers breached its network via Ivanti zero-days

April 22, 2024

In January 2024, MITRE Corporation reported a security breach instigated by a state-sponsored hacking group that exploited two zero-day vulnerabilities in Ivanti VPNs. The breach was initially detected due to unusual activity in an unclassified network environment used for research and development, prompting an immediate investigation. Although the breach did not compromise MITRE's core enterprise network or its affiliates, the attackers were able to maneuver through the network and access sensitive data by using sophisticated methods to bypass security measures, including multi-factor authentication. The incident has prompted notifications to impacted parties and collaborations with authorities as MITRE works to establish secure operational alternatives while advocating for improved cybersecurity defenses across the industry.

MITRE says state hackers breached its network via Ivanti zero-days Bleeping Computer

Read More

The rise of the chief AI officer

April 22, 2024

As companies increasingly integrate artificial intelligence into their operations, the role of Chief AI Officer (CAIO) is becoming more prevalent. This executive position is dedicated to overseeing and strategically deploying AI technology within a company. The responsibilities of a CAIO include ensuring AI alignment with corporate goals, managing AI projects, and navigating ethical considerations associated with AI use. This role is crucial as businesses seek to harness AI’s potential while addressing the complexities it introduces.

The rise of the chief AI officer Financial Times

Read More

Cisco Discloses High-Severity Vulnerability, Exploit Code Released

April 22, 2024

Cisco has disclosed and issued a patch for a high-severity vulnerability affecting the Integrated Management Controller in a range of devices, including UCS C-Series Rack Servers and 5000 Series Enterprise Network Compute Systems. This flaw, having an 8.8 out of 10 severity rating, could allow an authenticated, local attacker with at least read-only privileges to execute command injection attacks and gain root access. While Cisco reported no known instances of the vulnerability being exploited, code that could be used for such purposes has been made public. Customers are urged to apply the provided patches, as no alternative mitigations have been advised, and a wide spectrum of Cisco devices could be impacted if running vulnerable versions of the software with default configurations.

Cisco Discloses High-Severity Vulnerability, Exploit Code Released CRN

Read More
View All
Insights by Kate Gamble
View All
Our Partners

Premier

Diamond Partners

Platinum Partners

Silver Partners

This Week Health
Healthcare Transformation Powered by Community

Questions about the Podcast?

Contact us with any questions, requests, or comments about the show. We love hearing your feedback.

Hello@ThisWeekHealth.com

Looking to connect or attend events? Visit our sister organization, 229 Project
Click here.

© Copyright 2024 Health Lyrics All rights reserved