BankInfoSecurity.com
Stryker Wiper Attack: Hackers Boast as Lawsuits Pile Up
1 week 4 days ago
Medtech Maker Is Still Recovering While Iranian Hackers Threaten More Attack Victims
As medtech maker Stryker continues working to restore global IT systems brought offline by a cyberattack last week, class action lawsuits against the company are piling up in federal court and the Iranian hackers claiming credit for the attack are warning of more assaults to come on other victims.
As medtech maker Stryker continues working to restore global IT systems brought offline by a cyberattack last week, class action lawsuits against the company are piling up in federal court and the Iranian hackers claiming credit for the attack are warning of more assaults to come on other victims.
Trump's National Cyber Strategy Leaves Industry Role Unclear
1 week 4 days ago
White House Cyber Strategy Urges Deeper Industry Partnership Without Defining Roles
The administration's cyber strategy pushes deeper public-private coordination and expanded threat visibility across critical infrastructure, but lacks specifics on operational roles, incentives and legal protections needed for industry to actively disrupt malicious activity.
The administration's cyber strategy pushes deeper public-private coordination and expanded threat visibility across critical infrastructure, but lacks specifics on operational roles, incentives and legal protections needed for industry to actively disrupt malicious activity.
Mitsubishi Deal Gives Nozomi Broader OT Security Reach
1 week 4 days ago
CEO Says Added OEM Context Can Sharpen Industrial Cybersecurity and New Use Cases
Nozomi Networks CEO Edgard Capdevielle said Mitsubishi Electric's purchase gives the industrial cybersecurity firm richer OEM context to improve OT and IoT security and pursue adjacent use cases such as asset visibility, maintenance support and operational efficiency across critical infrastructure.
Nozomi Networks CEO Edgard Capdevielle said Mitsubishi Electric's purchase gives the industrial cybersecurity firm richer OEM context to improve OT and IoT security and pursue adjacent use cases such as asset visibility, maintenance support and operational efficiency across critical infrastructure.
Rethinking AML for Real-Time Payments
1 week 4 days ago
Datos Insights' Serpil Hall on Using Predictive AML Tools to Support Compliance
Instant payments are reshaping financial crime controls as speed and the irreversibility of transactions strain anti-money laundering compliance programs. While many assume real-time AML means faster processing, this approach can increase risk, said Serpil Hall, strategic advisor at Datos Insights.
Instant payments are reshaping financial crime controls as speed and the irreversibility of transactions strain anti-money laundering compliance programs. While many assume real-time AML means faster processing, this approach can increase risk, said Serpil Hall, strategic advisor at Datos Insights.
Why Data Security Standards in Cancer Innovation Matter
1 week 4 days ago
Cancer research and treatment innovation - and the tech that powers that - requires a great deal of collaboration and data sharing among multiple parties. But keeping that sensitive information secure and private is crucial - and requires adherence to standards, said Baxter Lee of Clearwater.
How Dell Is Building the Secure Agentic Enterprise
1 week 4 days ago
Dell's AI Blueprint for Identity, Agents and Agentic Infrastructure
Going all-in on AI with a top down strategy and a ravenous appetite for innovation has helped Dell transform its operations and grow revenue by $30 billion, and the company's evolution lays out a blueprint for how CIOs should think about building infrastructure for AI and managing an army of agents.
Going all-in on AI with a top down strategy and a ravenous appetite for innovation has helped Dell transform its operations and grow revenue by $30 billion, and the company's evolution lays out a blueprint for how CIOs should think about building infrastructure for AI and managing an army of agents.
Native Launches With $42M for Multi-Cloud Security Push
1 week 4 days ago
Startup Native Targets Enterprise Policy-to-Architecture Gap Across Clouds
Startup Native emerged from stealth with $42 million to advance a proactive cloud security model that enforces policy-driven controls, helping enterprises manage AI-driven threats and maintain consistent protections across complex multi-cloud environments.
Startup Native emerged from stealth with $42 million to advance a proactive cloud security model that enforces policy-driven controls, helping enterprises manage AI-driven threats and maintain consistent protections across complex multi-cloud environments.
House Panel Warns of Chinese AI Robotics Threat
1 week 4 days ago
AI, Robotics Leaders Warn Chinese Robots Could Disrupt Sensitive Operations
Witnesses told a U.S. House Homeland Security panel that Chinese-developed AI robotics platforms could give Beijing new avenues for surveillance, disruption and physical harm across critical sectors, and urged restrictions on federal use as China expands its industrial dominance.
Witnesses told a U.S. House Homeland Security panel that Chinese-developed AI robotics platforms could give Beijing new avenues for surveillance, disruption and physical harm across critical sectors, and urged restrictions on federal use as China expands its industrial dominance.
EU Belatedly Sanctions Chinese and Iranian Hackers
1 week 4 days ago
Chinese Hacking Firm iSoon and Iran's Emennet Pasargad Among Targets
The European Union sanctioned three Chinese and Iranian hacking operations that have been under U.S. indictments or sanctions for over a year - or, in one case, since 2019. The sanctions freeze assets and forbid EU citizens and companies from funding or otherwise doing business with the targets.
The European Union sanctioned three Chinese and Iranian hacking operations that have been under U.S. indictments or sanctions for over a year - or, in one case, since 2019. The sanctions freeze assets and forbid EU citizens and companies from funding or otherwise doing business with the targets.
Webinar | How Financial Institutions Are Managing Cloud Security Risk
1 week 5 days ago
Surf Raises $57M to Automate Security Hygiene With AI Agents
1 week 5 days ago
New York-Based Startup's AI Agents Analyze Asset Context to Fix Security Gaps
Surf AI launched an AI-driven platform designed to automate security hygiene tasks across enterprise environments. Backed by $57 million in funding, the company uses AI agents and contextual asset analysis to identify and remediate risks across identities, cloud assets and sensitive data.
Surf AI launched an AI-driven platform designed to automate security hygiene tasks across enterprise environments. Backed by $57 million in funding, the company uses AI agents and contextual asset analysis to identify and remediate risks across identities, cloud assets and sensitive data.
Webinar | Achieving Digital Resilience: Navigating DORA and AI Security in the Multi-Cloud Era
1 week 6 days ago
Inside Nevada's Push for Secure Digital Government
1 week 6 days ago
State CIO Tim Galluzi on Identity Modernization, AI and Resident Services
The State of Nevada is accelerating its cybersecurity and digital modernization efforts after a major ransomware attack exposed the importance of resilience, workforce readiness and strong governance, said State CIO Tim Galluzi.
The State of Nevada is accelerating its cybersecurity and digital modernization efforts after a major ransomware attack exposed the importance of resilience, workforce readiness and strong governance, said State CIO Tim Galluzi.
Beyond CVSS: OT Security Looks for Its Risk Methodology
1 week 6 days ago
Individual Vulnerability Severity Not Always a Good Measure of Risk Exposure
A mainstay of IT security programs across the world, the Common Vulnerability Scoring System, may have terminal flaws when applied to the mirror universe of operational technology - a place where ordinary assumptions about risk don't apply.
A mainstay of IT security programs across the world, the Common Vulnerability Scoring System, may have terminal flaws when applied to the mirror universe of operational technology - a place where ordinary assumptions about risk don't apply.
NY Sets 'First-of-Nation' Cyber Mandates for Water Sector
1 week 6 days ago
Program Offers Up to $100K for Security Upgrades and $50K for Assessments
New York is rolling out new cybersecurity regulations for water and wastewater utilities, requiring operators to conduct risk assessments and deploy security controls while offering $2.5 million in grants to strengthen defenses against rising cyberthreats targeting critical infrastructure.
New York is rolling out new cybersecurity regulations for water and wastewater utilities, requiring operators to conduct risk assessments and deploy security controls while offering $2.5 million in grants to strengthen defenses against rising cyberthreats targeting critical infrastructure.
US Lawmakers Call for CISA Polygraph Probe
1 week 6 days ago
House Democrats Demand Probe Into Former CISA Head Gottumukkala Poly Failures
Five U.S. Democratic lawmakers called for an investigation into a series of escalating controversies surrounding Cybersecurity and Infrastructure Security Agency leadership, following allegations that ex-Acting Director Madhu Gottumukkala bypassed established intelligence protocols.
Five U.S. Democratic lawmakers called for an investigation into a series of escalating controversies surrounding Cybersecurity and Infrastructure Security Agency leadership, following allegations that ex-Acting Director Madhu Gottumukkala bypassed established intelligence protocols.
When Liability Turns the CISO Into the Fall Guy
2 weeks 1 day ago
Rising Liability Risks Are Reshaping the CISO Role and Cybersecurity Leadership
As regulators pursue accountability after major breaches, CISOs face growing personal liability. This is changing how security leaders report risk, weakening security culture and making the role less attractive to experienced practitioners.
As regulators pursue accountability after major breaches, CISOs face growing personal liability. This is changing how security leaders report risk, weakening security culture and making the role less attractive to experienced practitioners.
Navigating Cybersecurity Obstacles in Rural Healthcare
2 weeks 1 day ago
Real and intense financial pressures on rural and small healthcare clinics mandate making difficult decisions on allocating funds to cybersecurity, said Greg Sieg, CISO at the University of Michigan Regional Health Network. "The funding is just not there."
Conducting a Security Risk Analysis Under Legal Privilege
2 weeks 1 day ago
Attorneys can conduct security risks assessments under the color of client privilege, making it less likely to surface in discovery during litigation. But healthcare firms should consider the cons before they take that route, said attorney Adam Greene, partner at the law firm Davis Wright Tremaine.
Checked
3 hours 41 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed