DataBreachToday.com
Federal IT Buyers Told to Plan for Post-Quantum Cryptography
2 weeks 6 days ago
CISA Urges Agencies to Treat Quantum Readiness as a Standard Buying Expectation
The Cybersecurity and Infrastructure Security Agency is urging agencies to treat post-quantum cryptography as a near-term procurement expectation, signaling that information technology products should embed quantum-resistant security now to avoid rushed retrofits before federal migration deadlines.
The Cybersecurity and Infrastructure Security Agency is urging agencies to treat post-quantum cryptography as a near-term procurement expectation, signaling that information technology products should embed quantum-resistant security now to avoid rushed retrofits before federal migration deadlines.
Report: Attacks 'Cascade' From IT, OT to Patient Care
2 weeks 6 days ago
Trellix Says Email, Identify Failures Are Among Top Vectors in Health Compromises
Of the millions of threats detected in healthcare IT environments last year, email phishing, identity failures and device vulnerabilities were among the top vectors for non-clinical IT compromises - often "cascading" and disrupting patient care, said a new report from security firm Trellix.
Of the millions of threats detected in healthcare IT environments last year, email phishing, identity failures and device vulnerabilities were among the top vectors for non-clinical IT compromises - often "cascading" and disrupting patient care, said a new report from security firm Trellix.
Memcyco Gets $37M to Fight AI-Powered Impersonation Attacks
2 weeks 6 days ago
Digital Risk Protection Startup to Expand Preemptive Scam Detection Tools
With brand impersonation and account takeover attacks surging, Memcyco raised $37 million in Series A funding to scale its preemptive scam detection platform. The firm plans to grow its sales team, develop AI-based features and support new product launches in the coming year.
With brand impersonation and account takeover attacks surging, Memcyco raised $37 million in Series A funding to scale its preemptive scam detection platform. The firm plans to grow its sales team, develop AI-based features and support new product launches in the coming year.
Privacy Is Fueling the CIO's AI Agenda
2 weeks 6 days ago
Cisco Research Shows How AI Is Reshaping Data Privacy and Governance
Enterprise data privacy and governance are undergoing fundamental shifts as the promised speed and efficiency of artificial intelligence come crashing into the realities of data risk and regulatory uncertainty.
Enterprise data privacy and governance are undergoing fundamental shifts as the promised speed and efficiency of artificial intelligence come crashing into the realities of data risk and regulatory uncertainty.
Webinar | Seeing the Why: How Agentic AI Brings Context and Confidence to Compliance and Security Decisions
3 weeks ago
Webinar | Seeing the Why: How Agentic AI Brings Context and Confidence to Compliance and Security Decisions
3 weeks ago
Rethinking Cybersecurity in a Platform World
3 weeks ago
How Consolidation Is Forcing CISOs and CIOs to Rethink Security Architecture
For more than a decade, enterprise security has relied on point solutions. Companies invested in separate tools - endpoint detection, firewalls, cloud security and IAM - each designed to address a specific threat or compliance requirement. But that approach is starting to break down.
For more than a decade, enterprise security has relied on point solutions. Companies invested in separate tools - endpoint detection, firewalls, cloud security and IAM - each designed to address a specific threat or compliance requirement. But that approach is starting to break down.
Webinar | From Continuous Controls Monitoring to Continuous Assurance: How a Security Data Fabric Unlocks the Next Era of Compliance
3 weeks ago
Webinar | From Continuous Controls Monitoring to Continuous Assurance: How a Security Data Fabric Unlocks the Next Era of Compliance
3 weeks ago
Webinar | Securing the Modern Software Supply Chain's Weakest Links
3 weeks ago
Treasury Cuts Ties With Booz Allen Over IRS Data Leaks
3 weeks ago
Booz Allen Loses Treasury Work in Move Tied to Trump Waste Crackdown
The U.S. Department of Treasury said it canceled all active contracts with Booz Allen Hamilton, citing data protection failures in handling taxpayer information. Treasury cited a criminal case against Charles Littlejohn, a former employee who leaked the tax returns of President Donald Trump.
The U.S. Department of Treasury said it canceled all active contracts with Booz Allen Hamilton, citing data protection failures in handling taxpayer information. Treasury cited a criminal case against Charles Littlejohn, a former employee who leaked the tax returns of President Donald Trump.
Claroty Gets $150M to Lead in AI for Infrastructure Security
3 weeks ago
Claroty CEO Yaniv Vardi Outlines IPO Strategy and Growth Through Acquisition
Claroty’s $150 million Series F funding round will help scale its platform for protecting critical infrastructure with embedded AI. CEO Yaniv Vardi says the company aims to reach profitability, pursue M&A and strengthen verticalized offerings for the healthcare, manufacturing and industrial spaces.
Claroty’s $150 million Series F funding round will help scale its platform for protecting critical infrastructure with embedded AI. CEO Yaniv Vardi says the company aims to reach profitability, pursue M&A and strengthen verticalized offerings for the healthcare, manufacturing and industrial spaces.
Upwind Secures $250M to Extend CNAPP to AI, Data Security
3 weeks ago
Series B Round at $1.5B Valuation Backs Push Into AI, Application and Data Security
Cloud security startup Upwind has raised $250 million to expand its CNAPP capabilities beyond detection and response. The company aims to accelerate engineering investment and move into high-demand categories such as AI and data security, achieving a $1.5 billion valuation.
Cloud security startup Upwind has raised $250 million to expand its CNAPP capabilities beyond detection and response. The company aims to accelerate engineering investment and move into high-demand categories such as AI and data security, achieving a $1.5 billion valuation.
Study: Future IT Workers Would Sell Patient Data
3 weeks ago
Nearly 60% of Tech Students Said They'd Violate HIPAA If the Price Was Right
Budding IT insiders can be corrupted into giving up protected health information of a very famous patient, say State University of New York at Buffalo researchers who also found a correlation between an interest in white hat hacking and illegal breaches.
Budding IT insiders can be corrupted into giving up protected health information of a very famous patient, say State University of New York at Buffalo researchers who also found a correlation between an interest in white hat hacking and illegal breaches.
Identity Fraud: The New Crimewave Targeting Remote Work
3 weeks 1 day ago
The Urgency of High-Assurance Identity Proofing Amid Growing Identity Fraud
Remote work has fueled a new crimewave built on stolen and synthetic identities. As deepfakes scale, high-assurance identity proofing - combining biometrics, liveness detection and verified IDs - becomes essential to verify users, prevent impersonation and protect enterprise access.
Remote work has fueled a new crimewave built on stolen and synthetic identities. As deepfakes scale, high-assurance identity proofing - combining biometrics, liveness detection and verified IDs - becomes essential to verify users, prevent impersonation and protect enterprise access.
Charting the Next Era of Digital Identity and Trust
3 weeks 1 day ago
Identity Proofing Becomes Essential as Remote Work Redefines Enterprise Trust
Remote work has expanded hiring reach but introduced new risk. Identity now must be verified through digital signals rather than physical interactions. High-assurance identity proofing using solutions such as MajorKey's IDProof+ helps enterprises protect data, mitigate fraud and preserve trust.
Remote work has expanded hiring reach but introduced new risk. Identity now must be verified through digital signals rather than physical interactions. High-assurance identity proofing using solutions such as MajorKey's IDProof+ helps enterprises protect data, mitigate fraud and preserve trust.
Continuous Identity Assurance Is Now Security Infrastructure
3 weeks 1 day ago
From Remote Hiring to Access and Support, Trust Must Be Verified - Not Assumed
Attackers no longer break in - they simply impersonate an employee or contractor to gain access. Discover how continuous identity assurance across hiring, third-party access and call centers reduces human-layer risk, and how IDProof+ enables fast, trusted verification across critical workflows.
Attackers no longer break in - they simply impersonate an employee or contractor to gain access. Discover how continuous identity assurance across hiring, third-party access and call centers reduces human-layer risk, and how IDProof+ enables fast, trusted verification across critical workflows.
Webinar | Hyper TPRM: Rethinking Third-Party Risk for Scale, Speed, and Confidence
3 weeks 1 day ago
Live Webinar | APIs for AI Agents: Building Predictable, Governed Systems at Enterprise Scale
3 weeks 3 days ago
Checked
6 hours 57 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed