Tag cybersecurity

White House Approves Update to HIPAA Security Rule

HIPAA/HITECH, Standards, Regulations & Compliance HHS Proposes New Encryption and Cybersecurity Standards for Healthcare Organizations Chris Riotta (@chrisriotta) • December 27, 2024 Recent high-profile breaches have targeted sensitive healthcare data. (Image: Shutterstock) The U.S. Department of Health and Human Services (HHS) is intensifying its digital security measures in response to…

Read MoreWhite House Approves Update to HIPAA Security Rule

Cyber Tug-of-War: China Accuses the U.S. of Targeting Its Technology Infrastructure with Cyber Attacks

Recent weeks have witnessed a notable evolution in the narrative surrounding online espionage, particularly between the United States and China. Historically, Western entities have consistently attributed cyberattacks on vital infrastructure to state-sponsored actors from China, aimed at pilfering trade secrets, intellectual property, and sensitive information. However, the tides have turned…

Read MoreCyber Tug-of-War: China Accuses the U.S. of Targeting Its Technology Infrastructure with Cyber Attacks

Year in Review: Australia Enhances Cybersecurity Regulations

Geo Focus: Australia, Geo-Specific, Standards, Regulations & Compliance 2024 Sees Increased Government Mandates on Cybersecurity in Australia Jayant Chakravarti (@JayJay_Tech) • December 26, 2024 Inside Parliament in Canberra, Australia. (Image: Shutterstock) In 2024, Australia implemented a comprehensive suite of cybersecurity laws and regulations to bolster its defenses following significant breaches…

Read MoreYear in Review: Australia Enhances Cybersecurity Regulations

US Congress Approves $3 Billion to Replace Chinese Telecommunications Equipment

Critical Infrastructure Security Federal ‘Rip-and-Replace’ Program Receives Financial Support in Defense Legislation Chris Riotta (@chrisriotta) • December 26, 2024 Experts indicate the FCC rip-and-replace initiative has encountered a $3 billion funding deficit necessary to eliminate associated threats. (Image: Shutterstock) The U.S. telecom sector is poised to benefit from a federal…

Read MoreUS Congress Approves $3 Billion to Replace Chinese Telecommunications Equipment

How Contemporary SecOps Teams Leverage CTEM to Evaluate and Mitigate Cyber Threats

Gartner has introduced the Continuous Threat Exposure Management (CTEM) framework, a strategic tool designed to guide organizations of varying sizes and maturity levels in tackling contemporary cybersecurity challenges. This framework emphasizes the ongoing assessment of the accessibility, exposure, and exploitability of an organization’s assets. Gartner forecasts that companies that adopt…

Read MoreHow Contemporary SecOps Teams Leverage CTEM to Evaluate and Mitigate Cyber Threats

Unraveling Cyber Resilience: Creating a Strong Defense System

Strengthening Cyber Resilience: Insights from InfoSec Officer Shervin Evans In an era where cyber threats continually evolve, organizations face mounting pressure to enhance their cyber resilience standards. Shervin Evans, an enterprise architect and information security officer at Deltec Bank and Trust, emphasizes that while traditional cybersecurity efforts focus on preventing…

Read MoreUnraveling Cyber Resilience: Creating a Strong Defense System

Indonesia Government Data Breach: Hackers Expose 82 GB of Sensitive Information Online

Massive Data Breach Hits Indonesian Government Financial System Recent reports indicate that hackers have successfully breached the Indonesian government’s Regional Financial Management Information System, known as SIPKD, extracting an extensive 82 GB of sensitive data. This system is managed by the Badan Pendapatan, Pengelolaan Keuangan, dan Aset Daerah (BPPKAD), which…

Read MoreIndonesia Government Data Breach: Hackers Expose 82 GB of Sensitive Information Online

Marriott and Starwood Hotels Encouraged to Enhance Data Security Protocols

In a significant regulatory move, the Federal Trade Commission (FTC) has finalized an order mandating Marriott International and its subsidiary Starwood Hotels to overhaul their data security protocols. This decision comes in response to multiple substantial data breaches that have compromised sensitive customer information, including passports and payment card details.…

Read MoreMarriott and Starwood Hotels Encouraged to Enhance Data Security Protocols