health care, data, cloud, quantum, medical device healthcare encryption zero-trust health care CISO Talk - Healthcare and Cyber - cybersecurity - cyber threats - cyberattack

PharMerica Breach: The Lure of Health Care Data

Two months after noticing suspicious activity in its systems, PharMerica disclosed that nearly six million patients had their health care data stolen by threat actors. The large pharmacy services company, which has ...
Security Boulevard
Understanding the Potential Risks of Using ChatGPT and AI

Understanding the Potential Risks of Using ChatGPT and AI

The capabilities of artificial intelligence (AI) such as ChatGPT have prompted the global market to increasingly adopt generative AI in their organizations. However, there are potential legal and business risks associated with ...
Following the Money: Killnet’s ‘Infinity Forum’ Wooing Likeminded Cybercriminals

Following the Money: Killnet’s ‘Infinity Forum’ Wooing Likeminded Cybercriminals

Pro-Kremlin hacktivist DDoS group Killnet has created a new illicit forum, called Infinity, that hopes to bridge the gap between hacktivists and cybercriminals—and continue its quest for money and notoriety. The post ...
Red Menshen budgets semiconductor data, secure, conflict, oil security tools budget dark, web, threat

Cybercrime Threat Intelligence is More Critical Than Ever

As the old saying goes, knowledge is power. And in the world of cybersecurity, that could not be more true. Security teams need to have access to timely and relevant threat intelligence ...
Security Boulevard

What to Know about APIs, the “On-Ramps to the Digital World”

An application programming interface, or API, is a defined process that allows data to be shared between applications or programs. Each API consists of a set of rules that dictates how communication ...
threat-informed defense

Threat-Informed Defense 101: Understanding the Basics

Over the last decade, the MITRE ATT&CK knowledge base has been widely adopted by thousands of security defenders, ultimately forming a strong community for ATT&CK users. Security teams have leveraged ATT&CK to ...
Security Boulevard

Convergence and adoption of AI and ML countering the cyber threat

During the last few years, we have witnessed an increase in advanced cyber attacks. Cybercriminals utilize advanced technology to breach the digital boundary and exploit enterprises’ security vulnerabilities. No industry feels secure; ...

The State of Data Security in 2022: The CISOs Perspective

In the two years proceeding from the beginning of the COVID-19 pandemic, the business world has been transformed on a grand scale. Organizations have created more data than ever before, data is ...
Defense in Depth to minimize the impact of ransomware attacks

Defense in Depth to minimize the impact of ransomware attacks

Ransomware attacks continue to plague organizations globally regardless of their size. In a press release by the NCC group that preceded the Annual Threat Monitor Report 2021 published for the year 2021, ...