BankInfoSecurity.com
Inside Nevada's Push for Secure Digital Government
17 minutes 39 seconds ago
State CIO Tim Galluzi on Identity Modernization, AI and Resident Services
The State of Nevada is accelerating its cybersecurity and digital modernization efforts after a major ransomware attack exposed the importance of resilience, workforce readiness and strong governance, said State CIO Tim Galluzi.
The State of Nevada is accelerating its cybersecurity and digital modernization efforts after a major ransomware attack exposed the importance of resilience, workforce readiness and strong governance, said State CIO Tim Galluzi.
Beyond CVSS: OT Security Looks for Its Risk Methodology
17 minutes 39 seconds ago
Individual Vulnerability Severity Not Always a Good Measure of Risk Exposure
A mainstay of IT security programs across the world, the Common Vulnerability Scoring System, may have terminal flaws when applied to the mirror universe of operational technology - a place where ordinary assumptions about risk don't apply.
A mainstay of IT security programs across the world, the Common Vulnerability Scoring System, may have terminal flaws when applied to the mirror universe of operational technology - a place where ordinary assumptions about risk don't apply.
NY Sets 'First-of-Nation' Cyber Mandates for Water Sector
17 minutes 39 seconds ago
Program Offers Up to $100K for Security Upgrades and $50K for Assessments
New York is rolling out new cybersecurity regulations for water and wastewater utilities, requiring operators to conduct risk assessments and deploy security controls while offering $2.5 million in grants to strengthen defenses against rising cyberthreats targeting critical infrastructure.
New York is rolling out new cybersecurity regulations for water and wastewater utilities, requiring operators to conduct risk assessments and deploy security controls while offering $2.5 million in grants to strengthen defenses against rising cyberthreats targeting critical infrastructure.
US Lawmakers Call for CISA Polygraph Probe
17 minutes 39 seconds ago
House Democrats Demand Probe Into Former CISA Head Gottumukkala Poly Failures
Five U.S. Democratic lawmakers called for an investigation into a series of escalating controversies surrounding Cybersecurity and Infrastructure Security Agency leadership, following allegations that ex-Acting Director Madhu Gottumukkala bypassed established intelligence protocols.
Five U.S. Democratic lawmakers called for an investigation into a series of escalating controversies surrounding Cybersecurity and Infrastructure Security Agency leadership, following allegations that ex-Acting Director Madhu Gottumukkala bypassed established intelligence protocols.
When Liability Turns the CISO Into the Fall Guy
2 days 18 hours ago
Rising Liability Risks Are Reshaping the CISO Role and Cybersecurity Leadership
As regulators pursue accountability after major breaches, CISOs face growing personal liability. This is changing how security leaders report risk, weakening security culture and making the role less attractive to experienced practitioners.
As regulators pursue accountability after major breaches, CISOs face growing personal liability. This is changing how security leaders report risk, weakening security culture and making the role less attractive to experienced practitioners.
Navigating Cybersecurity Obstacles in Rural Healthcare
2 days 18 hours ago
Real and intense financial pressures on rural and small healthcare clinics mandate making difficult decisions on allocating funds to cybersecurity, said Greg Sieg, CISO at the University of Michigan Regional Health Network. "The funding is just not there."
Conducting a Security Risk Analysis Under Legal Privilege
2 days 18 hours ago
Attorneys can conduct security risks assessments under the color of client privilege, making it less likely to surface in discovery during litigation. But healthcare firms should consider the cons before they take that route, said attorney Adam Greene, partner at the law firm Davis Wright Tremaine.
How Main Line Health Secures Devices With Microsegmentation
2 days 18 hours ago
An identity-based microsegmentation deployment at Main Line Health in Philadelphia is helping to control how its roughly 60,000 devices communicate across the network in order to protect clinical operations and limit the impact of potential cyberattacks, said Main Line Health CISO Aaron Weismann.
New European Emissions Regs Include Cybersecurity Rules
2 days 18 hours ago
Cybersecurity Requirements Could Clash With Right-to-Repair
Automakers are generally on track to implement new EU cybersecurity requirements in tailpipe emissions regulations instigated by the long shadow of Volkswagen's emissions scandal, but there could be a clash between those new rules and others that are intended to guarantee the right-to-repair.
Automakers are generally on track to implement new EU cybersecurity requirements in tailpipe emissions regulations instigated by the long shadow of Volkswagen's emissions scandal, but there could be a clash between those new rules and others that are intended to guarantee the right-to-repair.
Trump's Cyber Strategy Puts Private Sector on the Offensive
2 days 18 hours ago
Bold Plan Raises Hard Questions About Execution, Liability and Oversight
The Trump administration's national cyber strategy calls for a stronger partnership between the federal government and private companies, heralding a shift in the ways private enterprise could participate in offensive operations against nation-state adversaries, ransomware gangs and cybercriminals.
The Trump administration's national cyber strategy calls for a stronger partnership between the federal government and private companies, heralding a shift in the ways private enterprise could participate in offensive operations against nation-state adversaries, ransomware gangs and cybercriminals.
ISMG Editors: Iran Conflict Expands Into Cyber Warfare
2 days 18 hours ago
Also: the Pentagon-Anthropic AI Legal Showdown, the New Reality of Document Fraud
In this week's panel, four ISMG editors discuss the cyber activity tied to the U.S.-Israel-Iran conflict, the Pentagon's standoff with AI firm Anthropic and a new report that reveals how document fraud reflects deeper weaknesses in verification systems.
In this week's panel, four ISMG editors discuss the cyber activity tied to the U.S.-Israel-Iran conflict, the Pentagon's standoff with AI firm Anthropic and a new report that reveals how document fraud reflects deeper weaknesses in verification systems.
Bold Launches With $40M to Target AI Risks on Endpoints
2 days 18 hours ago
New Startup Says Cloud-Heavy Models Do Not Scale for Large Enterprises
Bold Security exited stealth with $40 million to build an endpoint platform for the artificial intelligence era. CEO Nati Hazut said companies can no longer rely on older controls as employees and AI agents access data locally, creating new blind spots around apps, files and device activity.
Bold Security exited stealth with $40 million to build an endpoint platform for the artificial intelligence era. CEO Nati Hazut said companies can no longer rely on older controls as employees and AI agents access data locally, creating new blind spots around apps, files and device activity.
AI Agents May Redefine Risk in Industrial Operations
3 days 10 hours ago
Gartner's Wam Voster on Potentially Harmful AI Decision Systems in OT Environments
Industrial environments already face potential cyberthreats that could lead to downtime. But now with AI agents poised to control operational decisions, factory managers need to watch for new safety risks for cyber-physical systems, said Wam Voster, vice president analyst at Gartner.
Industrial environments already face potential cyberthreats that could lead to downtime. But now with AI agents poised to control operational decisions, factory managers need to watch for new safety risks for cyber-physical systems, said Wam Voster, vice president analyst at Gartner.
Breach Roundup: Russian State Actors Target Signal, WhatsApp
3 days 10 hours ago
Also, More ClickFix Attacks and Teen Booters Arrested in Poland
This week, Russian hackers targeted Signal and WhatsApp users, permit-fee phishing hit U.S. applicants, ClickFix on WordPress sites, Microsoft patched 80 bugs, a 14K-router botnet, Polish teens held over DDoS tools and Finland warned of Russian, Chinese espionage. North Korean IT workers for hire.
This week, Russian hackers targeted Signal and WhatsApp users, permit-fee phishing hit U.S. applicants, ClickFix on WordPress sites, Microsoft patched 80 bugs, a 14K-router botnet, Polish teens held over DDoS tools and Finland warned of Russian, Chinese espionage. North Korean IT workers for hire.
Anthropic Seeks Court Stay of Pentagon Risk Designation
3 days 10 hours ago
Company Says Supply-Chain Risk Label Threatens Billions in Contracts
Anthropic filed an emergency motion asking a federal appeals court to block a Defense Department decision labeling the AI developer a national security supply-chain risk. The company says the move could cost billions and followed its refusal to weaken AI safety restrictions.
Anthropic filed an emergency motion asking a federal appeals court to block a Defense Department decision labeling the AI developer a national security supply-chain risk. The company says the move could cost billions and followed its refusal to weaken AI safety restrictions.
Sophisticated Surveillance RAT Marketed for Global Buyers
3 days 10 hours ago
'Cyber Android RAT' Can Capture WhatsApp History, Crypto Seed Phrases
Cybercriminals are advertising on criminal hacking online boards an Android remote access Trojan that can steal victims' WhatsApp conversation history, surveil them in real time and extract cryptocurrency seed phrases for the low price of about $500 a month.
Cybercriminals are advertising on criminal hacking online boards an Android remote access Trojan that can steal victims' WhatsApp conversation history, surveil them in real time and extract cryptocurrency seed phrases for the low price of about $500 a month.
'Systemic Risk' Stalks Healthcare Sector
4 days 3 hours ago
For the U.S. healthcare ecosystem, the 2024 ransomware attack on Change Healthcare proved to be a supply-chain earthquake in showcasing critical third-party risk that entities now must carefully and urgently consider, said Erik Decker, CISO of Intermountain Health and a federal cyber adviser.
How Medical Device Cyber Challenges Could Become Easier
4 days 3 hours ago
Medical device cyber challenges are among the most complex for manufacturers and healthcare delivery organizations for a variety of reasons, but there are some promising developments underway that could help ease the pain, said Phil Englert of the Health Information Sharing and Analysis Center.
Webinar | When Cyberattacks Look Like Normal IT Activity
4 days 3 hours ago
Checked
17 minutes 39 seconds ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed