Overcoming GenAI challenges in healthcare cybersecurity
In this Help Net Security interview, Assaf Mischari, Managing Partner, Team8 Health, discusses the risks associated with GenAI healthcare innovations and their impact on patient privacy. What are the key cybersecurity challenges in healthcare in the.....»»
How AI and zero trust are transforming resilience strategies
In this Help Net Security interview, John Hernandez, President and General Manager at Quest Software, shares practical advice for enhancing cybersecurity resilience against advanced threats. He underscores the need to focus on on-premises and cloud e.....»»
Cybersecurity is a fundamental component of patient care and safety
Healthcare institutions are custodians of vast repositories of sensitive patient data, encompassing comprehensive health histories, insurance profiles, and billing data. The ramifications of a data breach often extend far beyond the immediate task of.....»»
Ally Financial warns of "intensifying" credit challenges, shares slump
Ally Financial warned of challenges that have intensified over the quarter as borrowers struggled with high inflation......»»
CISA confirms that SonicWall vulnerability is getting exploited (CVE-2024-40766)
The US Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2024-40766 – a recently fixed improper access control vulnerability affecting SonicWall’s firewalls – to its Known Exploited Vulnerabilities catalog, thus.....»»
Ketch helps media brands enable privacy-safe data activation
Ketch launched its product suite for digital media brands. The digital media industry faces increasing challenges. Intense FTC scrutiny on targeted advertising, growing pressure to deliver precise, permissioned targeting, and the existential threat o.....»»
MI6 and CIA are combatting tech-savvy criminals with generative AI
Intelligence services are harnessing GenAI to navigate extremist content......»»
33 open-source cybersecurity solutions you didn’t know you needed
Open-source cybersecurity tools provide transparency and flexibility, allowing users to examine and customize the source code to fit specific security needs. These tools make cybersecurity accessible to a broader range of organizations and individual.....»»
Archaeologists challenge theory of violent Steppe invasion in Iberia Peninsula
A study by the Universitat Autònoma de Barcelona (UAB) and the University of Murcia (UM) challenges the theory that warrior groups with a "Steppe" genetic component originating from Eastern Europe violently replaced the male population of the Iberia.....»»
Red Hat Enterprise Linux AI extends innovation across the hybrid cloud
Red Hat Enterprise Linux (RHEL) AI is Red Hat’s foundation model platform, enabling users to develop, test, and run GenAI models to power enterprise applications. The platform brings together the open source-licensed Granite LLM family and Instruct.....»»
AI cybersecurity needs to be as multi-layered as the system it’s protecting
Cybercriminals are beginning to take advantage of the new malicious options that large language models (LLMs) offer them. LLMs make it possible to upload documents with hidden instructions that are executed by connected system components. This is a b.....»»
Hidden, compact galaxies in the distant universe—searching for the secrets behind the little red dots
Astronomers exploring the faraway universe with the James Webb Space Telescope, NASA's most powerful telescope, have found a class of galaxies that challenges even the most skillful creatures in mimicry—like the mimic octopus. This creature can imp.....»»
Solving the side effect problem of siRNA drugs for genetic disease treatment
Small interfering RNA (siRNA) drugs are a class of therapeutic agents that silence specific genes associated with inherited diseases. However, siRNA drugs have challenges because siRNAs often silence genes other than the target ones, causing side eff.....»»
Global experts present early-stage recommendations for nanomedicine development
They're tiny drug-delivery systems 1,000 times smaller than a human hair, but while nanomedicines have long been hailed as the future for treating debilitating and life-threatening diseases, their journey from lab to patient has many challenges......»»
Veza and HashiCorp join forces to help prevent credential exposure
Veza announced a partnership with HashiCorp to deliver an integrated solution for solving modern identity security challenges. Together, the Veza Access Platform and HashiCorp Vault empower joint customers to strengthen their identity security postur.....»»
A space oddity—small exoplanet challenges existing theories on planet formation
A research team led by Lund University in Sweden has discovered a small planet that displays peculiar orbital motion. The shimmying planet, located 455 light-years from Earth, shows that planetary systems can be considerably more complex than researc.....»»
vCISO services thrive, but challenges persist
While 75% of service providers report high customer demand for vCISO functionality, a new Cynomi report reveals that only 21% are actively offering it—opening a window onto a growth area for service providers while emphasizing the growing centralit.....»»
How to gamify cybersecurity preparedness
Organizations’ preparedness and resilience against threats isn’t keeping pace with cybercriminals’ advancements. Some CEOs still believe that cybersecurity requires episodic intervention rather than ongoing attention. That isn’t the reality f.....»»
The future of automotive cybersecurity: Treating vehicles as endpoints
The automotive industry is facing many of the same cybersecurity risks and threats that successful organizations in other sectors are up against, but it’s also battling some distinct ones. In this Help Net Security interview, Josh Smith, Principal.....»»
Prompt Security helps organizations monitor data shared with Microsoft 365 Copilot
Prompt Security launched a security and governance solution for Copilot for Microsoft 365, marking a significant milestone in GenAI Security for enterprise applications. As organizations rapidly adopt GenAI tools to boost productivity and innovation,.....»»
Proofpoint launches NIST-inspired framework to tackle data loss prevention challenges
Proofpoint launched a proprietary, partner-friendly, end-to-end information protection framework, providing organizations access to expertise, industry benchmark data and proven methodology in designing, implementing and maturing data loss prevention.....»»