NEWS
ARTICLES
PODCASTS
229 PROJECT
GUESTS
Subscribe
Subscribe
<-- Back to Insights
The Latest Cybersecurity & Privacy News
3 key strategies for mitigating non-human identity risks
Source:
CSO Online
Read More
Cybersecurity maturity: A must-have on the CISO's agenda
Source:
HealthLeaders
Read More
Rural Alabama Hospital Breach Exposes Data of 200,000 Patients
Source:
BankInfoSecurity
Read More
Lawmakers must incentivize cyber protection for critical infrastructure
Source:
Cyberscoop
Read More
HHS: Ransomware Group Everest Targeting Healthcare Sector
Source:
HCInnovationGroup
Read More
Microsoft Sway abused in massive QR code phishing campaign
Source:
Bleeping Computer
Read More
Cyberattack forced Michigan hospital to use paper records for 1st time in 20 years, CEO says
Source:
Becker's Hospital Review
Read More
Tool used by ransomware groups now seen killing EDR: Report
Source:
CSO Online
Read More
5 best practices for running a successful threat-informed defense in cybersecurity
Source:
publication
Read More
McLaren Health: IT Operations Fully Back Online Post-Attack
Source:
HealthcareInfoSecurity
Read More
The pen can be as mighty as the firewall
Source:
paulconnelly
Read More
To pay or not to pay: CISOs weigh in on the ransomware dilemma
Source:
CSO Online
Read More
6 insights every CIO should take away from the CrowdStrike debacle
Source:
cio.com
Read More
Violation of HIPAA Security Rule = Violation of NY SHIELD Act | Data Protection Report
Source:
Data Protection Report
Read More
Demonstrating Cybersecurity Value: Beyond Metrics
Source:
LinkedIn
Read More
Hardcoded Credential Vulnerability Found in SolarWinds Web Help Desk
Source:
thehackernews
Read More
Local Networks Go Global When Domain Names Collide
Source:
krebsonsecurity.com
Read More
Cyber insurance: what is it good for?
Source:
StackAware
Read More
What We Learned From the Cyberattack on Change Healthcare
Source:
wsj.com
Read More
The case for an independent U.S. Cyber Force
Source:
defensescoop.com
Read More
Zero-Trust Stands as a Secure Foundation for IoMT
Source:
FedTech Magazine
Read More
National Public Data Published Its Own Passwords
Source:
KrebsOnSecurity
Read More
Editorial: Why Cyber Fire Drills are an Imperative for Healthcare
Source:
The HIPAA Journal
Read More
Announcing mandatory multi-factor authentication for Azure sign-in | Microsoft Azure Blog
Source:
azure.microsoft.com
Read More
How the ransomware attack at Change Healthcare went down: A timeline
Source:
TechCrunch
Read More
Massive data breach that includes Social Security numbers may be even worse than suspected — Los Angeles Times
Source:
Los Angeles Times
Read More
Wiz researchers hacked into leading AI infrastructure providers
Source:
techtarget
Read More
Illinois, Florida, and Puerto Rico Healthcare Providers Confirm Data Breaches
Source:
The HIPAA Journal
Read More
White House working on cyber insurance policy proposal for ‘catastrophic’ incidents
Source:
The Record from Recorded Future News
Read More
Unsealed court filings offer details of DOJ investigation into Prospect Medical
Source:
HealthCare Dive
Read More
It’s time to stop thinking of threat groups as supervillains, experts say
Source:
Cybersecurity Dive
Read More
After health care attacks, tech giants will help small hospitals with cyber defenses
Source:
NPR
Read More
Zero-Click Exploit Concerns Drive Urgent Patching of Windows TCP/IP Flaw
Source:
SecurityWeek
Read More
Lawmaker calls for increased penalties for ransomware attacks against Michigan hospitals
Source:
The Detroit News
Read More
After the Dust Settles: Post-Incident Actions
Source:
publication
Read More
Six ransomware gangs behind over 50% of 2024 attacks
Source:
The Register
Read More
CrowdStrike accepted a ‘Most Epic Fail’ award at Def Con hacking conference
Source:
The Verge
Read More
Cybersecurity investigators worry ransomware attacks may worsen as young, Western hackers work with Russians
Source:
CBS News
Read More
Ransomware Kingpin Who Called Himself "J P Morgan" Extradited to the United States
Source:
Tripwire
Read More
NIST Releases First 3 Finalized Post-Quantum Encryption Standards
Source:
nist.gov
Read More
Compromising Microsoft's AI Healthcare Chatbot Service
Source:
Tenable Blog
Read More
Is the INC ransomware gang behind the attack on McLaren hospitals?
Source:
SecurityAffairs
Read More
Royal Ransomware Actors Rebrand as “BlackSuit,” FBI and CISA Release Update to Advisory | CISA
Source:
cisa.gov
Read More
Cybercrime is like a 'chronic disease,' AHA leader says
Source:
Becker's Hospital Review
Read More
CISA Encourages Organizations to Adopt a 'Secure by Demand' Strategy
Source:
Infosecurity Magazine
Read More
FBI Issues Warning As ‘Men In Black’ Hackers Demand $60 Million Ransom
Source:
Forbes
Read More
#BHUSA: Ransomware Drill Targets Healthcare in Operation 911
Source:
Infosecurity Magazine
Read More
USPS Text Scammers Duped His Wife, So He Hacked Their Operation
Source:
Wired
Read More
Easterly: Cybersecurity is a software quality problem
Source:
cyberscoop
Read More
PSA: Don't Be Like JD Vance And Leave Your Venmo Public
Source:
HuffPost
Read More
How a cybersecurity researcher befriended, then doxed, the leader of LockBit ransomware gang
Source:
TechCrunch
Read More
NIST releases three encryption standards to prepare for future quantum attacks
Source:
fedscoop
Read More
The best defense against insider threats – culture
Source:
paulconnelly
Read More
Third-Party Cyber Risk Impacts the Health Care Sector the Most. Here’s How to Prepare. | AHA News
Source:
AHA
Read More
Unlocking Modern Healthcare Security: A Journey Beyond Passwords
Source:
HealthTech Magazine
Read More
Six 0-Days Lead Microsoft’s August 2024 Patch Push
Source:
krebsonsecurity
Read More
Microsoft Deputy CISO recounts responding to the CrowdStrike outage
Source:
Cybersecurity Dive
Read More
Microsoft’s AI Can Be Turned Into an Automated Phishing Machine
Source:
Wired
Read More
McLaren Health Hit With Ransomware for Second Time in a Year
Source:
publication
Read More
Government Steps Up Efforts to Protect Healthcare Data
Source:
HealthInfoSec
Read More
CrowdStrike blames mismatch in Falcon sensor update for global IT outage
Source:
Cybersecurity Dive
Read More
CrowdStrike Outage Serves as Dress Rehearsal for Chinese Cyber-Attacks
Source:
infosecurity-magazine
Read More
Crowdstrike: Delta Air Lines refused free help to resolve IT outage
Source:
Bleeping Computer
Read More
CrowdStrike Publishes Technical Root Cause Analysis of Faulty Falcon Update
Source:
cybersecuritynews
Read More
CrowdStrike Reveals Root Cause of Global System Outages
Source:
thehackernews.com
Read More
North Korean hacker got hired by US security vendor, immediately loaded malware
Source:
arstechnica
Read More
The Potential Pitfalls Of Cybersecurity Platformization
Source:
Forbes
Read More
Six U.S. hospital breach reports from July; some have flown under the media radar – DataBreaches.Net
Source:
databreaches.net
Read More
Every Microsoft employee is now being judged on their security work
Source:
The Verge
Read More
Hospitals struggle to recruit and retain cybersecurity staff
Source:
Chief Healthcare Executive
Read More
Massive SMS stealer campaign infects Android devices in 113 countries
Source:
BleepingComputer
Read More
Prospects of compensation hazy for CrowdStrike customers, experts say
Source:
IT Brew
Read More
Delta CEO: ‘When was the last time you heard of a big outage at Apple?’
Source:
The Verge
Read More
Broke Cyber Pros Flock to Cybercrime Side Hustles
Source:
darkreading
Read More
Southeast hospitals impacted by cyberattack on OneBlood
Source:
aha.org
Read More
« Previous
1
…
6
7
8
9
10
…
14
Next »
Podcast Discussions
Challenges and Solutions to Unmanaged Devices in Healthcare: Visibility for Zero Trust
The 6 Key Steps for Improving Cybersecurity According to the HCIC: Which One Do you Need?
Exceeding the Expectations of Innovation as CIO and What Challenges face Rural American Healthcare
« Previous
1
…
6
7
8
9
10
…
17
Next »
Newsday: AI Post Executive Order: Changes and Innovations with Drex DeFord and Robbie Hughes
Newsday: Democratizing AI, Intelligent Apps, and Ransomware with Drex DeFord
Newsday: Data Management and Unseen Bias with Priscilla Sandberg
« Previous
1
…
6
7
8
9
10
…
26
Next »
Addressing Supply Chain Cybersecurity Risk and Patient Safety with Proofpoint
Showcasing Healthcare Transformation with Advanced Technologies with World Wide Technology and Intel
Scaling Software Solutions and Protecting Your Data with Rubrik Cloud
« Previous
1
…
6
7
8
9
Next »
Today: My Name is Chuck, I'm a Healthcare CIO and I'm Part of the Problem
Today: Headlines and Comments
Today: Ready for you Business Impact Audit?
Today: Change Healthcare / Optum is Taken Offline
Today: What can I do with a Deepfake in your environment
« Previous
1
…
6
7
8
9
10
…
21
Next »
Search
Search
Healthcare Transformation Powered by Community
About
About Us
Our Shows
Our Guests
Our Sponsors
Get Involved
Contact Us
Become a Contributor
Become a Sponsor
Tools
ClipNotes
Research
Featured Articles
Webinars
Privacy Policy
Disclaimer
Terms of Use
Privacy Policy
Disclaimer
Terms of Use
© Copyright 2024 Health Lyrics All rights reserved