Aggregator
HIPAA Security Rule Amendment: Key Public Comments and Next Steps
Major cybersecurity breaches continue to plague the US healthcare industry, and on December 27, 2024, the U.S. Department of Health and Human Services (HHS) issued a Notice of Proposed Rulemaking (NPRM) to amend the HIPAA Security Rule, titled "The HIPAA Security Rule to Strengthen the Cybersecurity of Electronic Protected Health Information". Comments were requested and over 4000 were received before the comment period ended on March 7 2025. This blog summarizes what the comments covered - and what comes next.
The post HIPAA Security Rule Amendment: Key Public Comments and Next Steps appeared first on Security Boulevard.
Fake Out: Babuk2 Ransomware Group Claims Bogus Victims
A ransomware group reusing the Babuk ransomware brand claims to have stolen data from the likes of Amazon, Delta and US Bank. Just one problem: Security experts found a startling overlap between its claimed victims and previous attacks scored by the likes of Clop, LockBit and RansomHub.
China Borrows From Feds' Anti-Hacker Psychological Playbook
Nothing beats messing with your adversaries' heads than taking a page from their psychological operations playbook. Witness China's Ministry of State Security unmasking four Taiwanese government hackers in a move borrowed from the U.S. government's playbook.
How Google-Wiz Deal Counters Microsoft Defender's Dominance
Google's plan to buy cloud security firm Wiz for $32 billion highlights its drive to compete with Microsoft Defender and expand multi-cloud protection, and will put pressure on AWS to respond. Forrester Analyst Andras Cser says Wiz will likely remain independent for now, easing integration hurdles.
Tech Giants, Utility Firms Form AI Consortium
Tech giants and utility providers on Thursday formed an alliance to harness artificial intelligence for a more resilient power grid. More than two dozen organizations are participating in the Open Power AI Consortium led by the Electric Power Research Institute.
Software Firm Notifying Patients, Practices of Data Exposure
An orthodontic practice software vendor is notifying an undisclosed number of patients that their data was exposed to the internet for 10 days last November. The security researcher who discovered the data leak said the incident appears to have lasted longer and affected more than 200,000 patients.
Chinese Hackers Exploit Unpatched Servers in Taiwan
Hackers with ties to China-based hacking groups including Volt Typhoon are breaching Taiwan's critical infrastructure by exploiting unpatched web and application servers as entry points for a cyberespionage campaign. Cisco Talos threat hunters identified the new threat actor as UAT-5918.
How can legacy IAM systems be updated to support NHIs?
Could Your Legacy IAM Be The Achilles Heel of Your Cybersecurity? When security breaches and data leaks proliferate, organizations grapple with the rising challenge of protecting their digital assets. This is particularly true for organizations with legacy Identity and Access Management (IAM) systems. While these systems have served us well in the past, could they […]
The post How can legacy IAM systems be updated to support NHIs? appeared first on Entro.
The post How can legacy IAM systems be updated to support NHIs? appeared first on Security Boulevard.
What role do NHIs play in modern identity and access management?
How Vital is the Role of Non-Human Identities in Identity and Access Management (IAM)? Have you ever wondered how digital machinery and applications gain access to our systems? The answer lies in Non-Human Identities (NHIs), a critical, yet often overlooked aspect of Identity and Access Management (IAM). But how significant is the role of NHIs […]
The post What role do NHIs play in modern identity and access management? appeared first on Entro.
The post What role do NHIs play in modern identity and access management? appeared first on Security Boulevard.
How do I ensure secure authentication for NHIs in an IAM system?
Is Your IAM System Adequately Protecting Non-Human Identities? Non-Human Identities (NHIs) are one such intricacy that has increasingly made its way into IAM (Identity Access Management) systems. However, the question remains: How do we ensure secure authentication for NHIs in an IAM system? Peeling Back the Layers of NHI NHIs, essentially, are machine identities used […]
The post How do I ensure secure authentication for NHIs in an IAM system? appeared first on Entro.
The post How do I ensure secure authentication for NHIs in an IAM system? appeared first on Security Boulevard.