The Food and Drug Administration is urging blood suppliers - a recent target of attacks - to bolster their cybersecurity practices to prevent and mitigate cyber incidents that could affect the supply and safety of critical blood and blood components used for transfusions and other patient care.
Major grocery store chains, Starbucks and other large organizations are experiencing disruptions following a ransomware attack against supply chain management service provider Blue Yonder. The provider said it is continuing to probe the attack and has no timeline for service restoration.
David Anderson's career began in banking and followed a path to the rapidly changing world of cyber insurance. Anderson, vice president of cyber liability at Woodruff Sawyer, shares how he built a practice rooted in transparency, trust and client education.
The Consumer Financial Protection Bureau's open banking ruling shifts liability burdens onto banks, amplifying their responsibilities for securing data shared with third-party fintechs. John Horn at Datos Insights explains the potential for third-party breaches.
Organizations around the globe are using third parties to accomplish business goals, and those vendors have become integral to creating a wider reach for those companies. As a result, they also bring risk and potential security issues to their partners. That’s why it’s imperative for security teams to implement a...
Evolving global regulations and an increasing reliance on third parties are reshaping how organizations think about risk. As more goods and services are outsourced, businesses face rising privacy, security, compliance, and operational risks, making the effective management of third parties mission critical.
Given...
A new playbook from the Health Sector Coordinating Council aims to help manufacturers of medical products such as pharmaceuticals, devices and durable equipment plot out and improve their response to ransomware attacks and other cyber incidents.
The Justice Department unsealed an indictment against alleged hackers Connor Moucka and John Binns, accusing them of stealing data from the cloud platform Snowflake, extorting millions in bitcoin and stealing sensitive personal information from over 165 organizations and millions of individuals.
Financial services leaders and cybersecurity experts said at Information Security Media Group’s 2024 Financial Services Summit that third-party vendor security risks required the need for proactive, multi-layered security frameworks to combat the growing threat landscape.
Finnish telecommunications equipment manufacturer Nokia is investigating the alleged posting of source code data on a criminal hacking forum. A hacker going by the handle of "IntelBroker" on Thursday posted what he said is a trove of "Nokia-related source code."
CrowdStrike has countersued customer Delta Air Lines, accusing the airline of employing a lawsuit and seeking damages in "a desperate attempt to shift blame" for Delta's own IT inadequacies having exacerbated its outage, unlike "other major airlines" that quickly resumed operations.
LinkedIn is facing several proposed class action lawsuits filed in recent weeks in California alleging that the company is "intercepting" users' sensitive information related to appointments booked on medical websites through the use of web tracking tools for marketing and advertising purposes.
This webinar covers how to shift from reactive to proactive incident response to improve cyber resilience. Learn specific strategies to prepare, identify, and respond effectively to emerging threats.
Key takeaways from this session include:
Discover preparation strategies to reduce reaction time during...
In today’s digital world, new threats constantly challenge cybersecurity frameworks, often pushing third-party risk management teams into reactive, high-stress responses. This webinar explores ways to move from reactive to proactive incident response, enhancing organizational resilience. Attendees will learn...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.