BankInfoSecurity.com
Federal IT Buyers Told to Plan for Post-Quantum Cryptography
1 day 1 hour ago
CISA Urges Agencies to Treat Quantum Readiness as a Standard Buying Expectation
The Cybersecurity and Infrastructure Security Agency is urging agencies to treat post-quantum cryptography as a near-term procurement expectation, signaling that information technology products should embed quantum-resistant security now to avoid rushed retrofits before federal migration deadlines.
The Cybersecurity and Infrastructure Security Agency is urging agencies to treat post-quantum cryptography as a near-term procurement expectation, signaling that information technology products should embed quantum-resistant security now to avoid rushed retrofits before federal migration deadlines.
Report: Attacks 'Cascade' From IT, OT to Patient Care
1 day 1 hour ago
Trellix Says Email, Identify Failures Are Among Top Vectors in Health Compromises
Of the millions of threats detected in healthcare IT environments last year, email phishing, identity failures and device vulnerabilities were among the top vectors for non-clinical IT compromises - often "cascading" and disrupting patient care, said a new report from security firm Trellix.
Of the millions of threats detected in healthcare IT environments last year, email phishing, identity failures and device vulnerabilities were among the top vectors for non-clinical IT compromises - often "cascading" and disrupting patient care, said a new report from security firm Trellix.
Memcyco Gets $37M to Fight AI-Powered Impersonation Attacks
1 day 1 hour ago
Digital Risk Protection Startup to Expand Preemptive Scam Detection Tools
With brand impersonation and account takeover attacks surging, Memcyco raised $37 million in Series A funding to scale its preemptive scam detection platform. The firm plans to grow its sales team, develop AI-based features and support new product launches in the coming year.
With brand impersonation and account takeover attacks surging, Memcyco raised $37 million in Series A funding to scale its preemptive scam detection platform. The firm plans to grow its sales team, develop AI-based features and support new product launches in the coming year.
Privacy Is Fueling the CIO's AI Agenda
1 day 1 hour ago
Cisco Research Shows How AI Is Reshaping Data Privacy and Governance
Enterprise data privacy and governance are undergoing fundamental shifts as the promised speed and efficiency of artificial intelligence come crashing into the realities of data risk and regulatory uncertainty.
Enterprise data privacy and governance are undergoing fundamental shifts as the promised speed and efficiency of artificial intelligence come crashing into the realities of data risk and regulatory uncertainty.
Identity Fraud: The New Crimewave Targeting Remote Work
1 day 15 hours ago
The Urgency of High-Assurance Identity Proofing Amid Growing Identity Fraud
Remote work has fueled a new crimewave built on stolen and synthetic identities. As deepfakes scale, high-assurance identity proofing - combining biometrics, liveness detection and verified IDs - becomes essential to verify users, prevent impersonation and protect enterprise access.
Remote work has fueled a new crimewave built on stolen and synthetic identities. As deepfakes scale, high-assurance identity proofing - combining biometrics, liveness detection and verified IDs - becomes essential to verify users, prevent impersonation and protect enterprise access.
Charting the Next Era of Digital Identity and Trust
1 day 15 hours ago
Identity Proofing Becomes Essential as Remote Work Redefines Enterprise Trust
Remote work has expanded hiring reach but introduced new risk. Identity now must be verified through digital signals rather than physical interactions. High-assurance identity proofing using solutions such as MajorKey's IDProof+ helps enterprises protect data, mitigate fraud and preserve trust.
Remote work has expanded hiring reach but introduced new risk. Identity now must be verified through digital signals rather than physical interactions. High-assurance identity proofing using solutions such as MajorKey's IDProof+ helps enterprises protect data, mitigate fraud and preserve trust.
Continuous Identity Assurance Is Now Security Infrastructure
1 day 15 hours ago
From Remote Hiring to Access and Support, Trust Must Be Verified - Not Assumed
Attackers no longer break in - they simply impersonate an employee or contractor to gain access. Discover how continuous identity assurance across hiring, third-party access and call centers reduces human-layer risk, and how IDProof+ enables fast, trusted verification across critical workflows.
Attackers no longer break in - they simply impersonate an employee or contractor to gain access. Discover how continuous identity assurance across hiring, third-party access and call centers reduces human-layer risk, and how IDProof+ enables fast, trusted verification across critical workflows.
Rethinking Cybersecurity in a Platform World
1 day 15 hours ago
How Consolidation Is Forcing CISOs and CIOs to Rethink Security Architecture
For more than a decade, enterprise security has relied on point solutions. Companies invested in separate tools - endpoint detection, firewalls, cloud security and IAM - each designed to address a specific threat or compliance requirement. But that approach is starting to break down.
For more than a decade, enterprise security has relied on point solutions. Companies invested in separate tools - endpoint detection, firewalls, cloud security and IAM - each designed to address a specific threat or compliance requirement. But that approach is starting to break down.
Webinar | Seeing the Why: How Agentic AI Brings Context and Confidence to Compliance and Security Decisions
1 day 15 hours ago
Webinar | From Continuous Controls Monitoring to Continuous Assurance: How a Security Data Fabric Unlocks the Next Era of Compliance
1 day 15 hours ago
Webinar | Seeing the Why: How Agentic AI Brings Context and Confidence to Compliance and Security Decisions
1 day 15 hours ago
Webinar | Securing the Modern Software Supply Chain's Weakest Links
1 day 15 hours ago
Treasury Cuts Ties With Booz Allen Over IRS Data Leaks
1 day 15 hours ago
Booz Allen Loses Treasury Work in Move Tied to Trump Waste Crackdown
The U.S. Department of Treasury said it canceled all active contracts with Booz Allen Hamilton, citing data protection failures in handling taxpayer information. Treasury cited a criminal case against Charles Littlejohn, a former employee who leaked the tax returns of President Donald Trump.
The U.S. Department of Treasury said it canceled all active contracts with Booz Allen Hamilton, citing data protection failures in handling taxpayer information. Treasury cited a criminal case against Charles Littlejohn, a former employee who leaked the tax returns of President Donald Trump.
Claroty Gets $150M to Lead in AI for Infrastructure Security
1 day 15 hours ago
Claroty CEO Yaniv Vardi Outlines IPO Strategy and Growth Through Acquisition
Claroty’s $150 million Series F funding round will help scale its platform for protecting critical infrastructure with embedded AI. CEO Yaniv Vardi says the company aims to reach profitability, pursue M&A and strengthen verticalized offerings for the healthcare, manufacturing and industrial spaces.
Claroty’s $150 million Series F funding round will help scale its platform for protecting critical infrastructure with embedded AI. CEO Yaniv Vardi says the company aims to reach profitability, pursue M&A and strengthen verticalized offerings for the healthcare, manufacturing and industrial spaces.
Upwind Secures $250M to Extend CNAPP to AI, Data Security
1 day 15 hours ago
Series B Round at $1.5B Valuation Backs Push Into AI, Application and Data Security
Cloud security startup Upwind has raised $250 million to expand its CNAPP capabilities beyond detection and response. The company aims to accelerate engineering investment and move into high-demand categories such as AI and data security, achieving a $1.5 billion valuation.
Cloud security startup Upwind has raised $250 million to expand its CNAPP capabilities beyond detection and response. The company aims to accelerate engineering investment and move into high-demand categories such as AI and data security, achieving a $1.5 billion valuation.
Study: Future IT Workers Would Sell Patient Data
1 day 15 hours ago
Nearly 60% of Tech Students Said They'd Violate HIPAA If the Price Was Right
Budding IT insiders can be corrupted into giving up protected health information of a very famous patient, say State University of New York at Buffalo researchers who also found a correlation between an interest in white hat hacking and illegal breaches.
Budding IT insiders can be corrupted into giving up protected health information of a very famous patient, say State University of New York at Buffalo researchers who also found a correlation between an interest in white hat hacking and illegal breaches.
Live Webinar | APIs for AI Agents: Building Predictable, Governed Systems at Enterprise Scale
4 days 19 hours ago
Live Webinar | APIs for AI Agents: Building Predictable, Governed Systems at Enterprise Scale
4 days 19 hours ago
ISMG Editors: How Deepfakes Are Breaking Digital Trust
4 days 19 hours ago
Also: How Non-Human Identities Redefine Security; the Delinea-StrongDM Deal
In this week's panel, four editors discussed how deepfakes are reshaping digital Know Your Customer practices, what the rise of non-human identities means for CISOs and what Delinea's acquisition of StrongDM tells us about where the privileged access market is heading.
In this week's panel, four editors discussed how deepfakes are reshaping digital Know Your Customer practices, what the rise of non-human identities means for CISOs and what Delinea's acquisition of StrongDM tells us about where the privileged access market is heading.
Checked
9 hours 27 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed