Tag cybersecurity

Trump’s Staffing Changes Impact the Nation’s Cyber Defense Agency

Government, Industry Specific Officials Express Optimism and Concerns Over New Cybersecurity Leadership Chris Riotta (@chrisriotta) • February 28, 2025 The Trump administration’s cyber leadership team is starting to take shape amidst staffing changes. (Image: Shutterstock) Recent developments within the U.S. Cybersecurity and Infrastructure Security Agency (CISA) suggest a potential shift…

Read MoreTrump’s Staffing Changes Impact the Nation’s Cyber Defense Agency

Why Cyber Criminals Target Schools: The Risks of Selling Stolen Data

BLACKSBURG, Va. (WDBJ) – Recent months have witnessed a series of cybersecurity breaches impacting educational institutions across Southwest Virginia, highlighting a growing trend that has raised concerns among stakeholders. Most notably, the Target 7 team reported an ongoing investigation into Appomattox County Public Schools last week, further alarming the community.…

Read MoreWhy Cyber Criminals Target Schools: The Risks of Selling Stolen Data

How Kyocera’s CISO Addresses Cyber Risks in the Era of AI Adoption

Kyocera’s Chief Information Security Officer, Andrew Smith, discusses proactive strategies for addressing the cyber risks linked to AI technologies and outlines actionable steps businesses can take for implementation. Since the explosive popularity of AI, especially following the launch of ChatGPT in November 2022, discussions surrounding this technology have gained significant…

Read MoreHow Kyocera’s CISO Addresses Cyber Risks in the Era of AI Adoption

US House Committee Halts Investigation into DOGE’s Access to DHS

Government, Industry Specific Republicans Reject Inquiry into Cyber Workforce Reductions and DOGE Access to Federal Networks Chris Riotta (@chrisriotta) • February 26, 2025 U.S. House Homeland Security Committee Ranking Member Bennie Thompson during a February 26, 2025 committee markup. (Image: U.S. House of Representatives) In a recent session, Republican members…

Read MoreUS House Committee Halts Investigation into DOGE’s Access to DHS

Effective Strategies for Healthcare Cyber Risk Teams to Prepare for HIPAA’s Security Rule Update

Established in 1996, the Health Insurance Portability and Accountability Act (HIPAA) has served as the benchmark for U.S. healthcare providers, health organizations, and entities handling health data to safeguard the privacy and security of electronic public health information (ePHI). It also stipulates penalties for non-compliance. In January 2025, the U.S.…

Read MoreEffective Strategies for Healthcare Cyber Risk Teams to Prepare for HIPAA’s Security Rule Update

Addressing Key AI Security Threats Identified in DeepSeek-R1

DeepSeek has emerged as a leading player in the artificial intelligence space, recently surpassing ChatGPT to become the most downloaded app on smartphones. This surge in adoption is largely due to its user-friendly interface and advanced capabilities. However, security analysts from Qualys have identified alarming vulnerabilities within DeepSeek-R1, highlighting significant…

Read MoreAddressing Key AI Security Threats Identified in DeepSeek-R1

Cybercriminals Exploited Vulnerabilities in Genea’s Patient System | Information Age

Data Breach at Genea Fertility: Sensitive Patient Information Compromised In a significant cybersecurity incident, Genea Fertility, a prominent IVF provider in Australia, has confirmed that all patient-related data was accessible to attackers, raising alarms about identity theft among both current and former clients. The breach, which the company identified as…

Read MoreCybercriminals Exploited Vulnerabilities in Genea’s Patient System | Information Age

Live Webinar | Unveiling the Formula for Assessing Cybersecurity Proposals

Live Webinar: Evaluating Cybersecurity Proposals – Unveiling the Essential Insights In the realm of cybersecurity, the scrutiny and evaluation of proposals can be a decisive factor for businesses seeking to enhance their defenses against increasingly sophisticated threats. A live webinar titled "Evaluating Cybersecurity Proposals – The Secret Formula" will delve…

Read MoreLive Webinar | Unveiling the Formula for Assessing Cybersecurity Proposals