Connected Medical Devices—the Next Target for Ransomware Attacks | Healthcare IT Today

Connected Medical Devices—the Next Target for Ransomware Attacks | Healthcare IT Today

The following is a guest article by Ryan Witt, Healthcare Cybersecurity Leader at Proofpoint The Internet of Medical Things, or IoMT, is a deep web of interconnected devices that increasingly plays a vital role in care delivery. Unfortunately, these devices have also significantly enhanced healthcare’s cyber risk, and security researchers have raised alarms about the vulnerabilities of these devices for more than a decade. While we haven’t seen threat actors widely exploiting the vulnerabilities in…

Read More

Getting a Tighter Grip on Supply Chain Security Risk

Getting a Tighter Grip on Supply Chain Security Risk

3rd Party Risk Management , Events , Governance & Risk Management Proofpoint CEO Ashan Willy on Ways to Identify Third-Party Compromises Michael Novinson (MichaelNovinson) • May 7, 2023     Ashan Willy, CEO, Proofpoint Some of the most sophisticated cyberattacks are being targeted at third-party suppliers in an effort to affect their critical clients, said Ashan Willy, CEO of Proofpoint. But often client organizations affected by these attacks do not even realize…

Read More

US Cybersecurity Strategy Shifts Liability Issues to Vendors

US Cybersecurity Strategy Shifts Liability Issues to Vendors

Governance & Risk Management , IT Risk Management , Standards, Regulations & Compliance Holding Vendors Liable for Insecure Apps Fuels Safe Harbor, Transparency Questions Michael Novinson (MichaelNovinson) • March 2, 2023     Photo: The White House website A new federal strategy to make commercial manufacturers liable for insecure software requires an attainable safe harbor policy and could be a disincentive for software manufacturers in sharing important vulnerability information with the U.S. government, according to…

Read More

Proofpoint CEO on Thwarting Post-Compromise Lateral Movement

Proofpoint CEO on Thwarting Post-Compromise Lateral Movement

Network Detection & Response , Next-Generation Technologies & Secure Development , Security Operations Ashan Willy on Helping Clients Spot Hacker Techniques Insider Their Own 4 Walls Michael Novinson (MichaelNovinson) • February 3, 2023     Ashan Willy, CEO, Proofpoint (Image: Proofpoint) Proofpoint has long focused on preventing cyberattacks, but customers have increasingly asked for help with blocking lateral movement from compromised identities, says CEO Ashan Willy. See Also: Live Webinar | Navigating the…

Read More

Proofpoint to Buy Deception Firm Illusive, Boost Offerings

Proofpoint to Buy Deception Firm Illusive, Boost Offerings

Active Defense & Deception , Next-Generation Technologies & Secure Development Ashan Willy’s First Deal as CEO Gets Proofpoint Into the Identity, Deception Spaces Michael Novinson (MichaelNovinson) • December 12, 2022     Ashan Willy has made his first acquisition as Proofpoint’s CEO, scooping up an identity startup established by Check Point’s former cloud and document security leader. See Also: Finding a Password Management Solution for Your Enterprise The Silicon Valley-based email security vendor says…

Read More

Examining the Effects of Cyberattacks on Patient Care

Examining the Effects of Cyberattacks on Patient Care

Cyberattacks on healthcare entities aren’t just annoyances. Healthcare IT and security professionals who participated in a recent survey conducted by the Ponemon Institute said cyberattacks result in poor patient outcomes including delayed procedures, increased complications – and even a rise in mortality. “The key takeaway of this research is that there is a direct connection between a cyber event and an adverse patient outcome,” says Ryan Witt, a healthcare cybersecurity executive with Proofpoint, which sponsored…

Read More

Cybersecurity Firm: What US Journalists Need To Know About The Foreign Hackers Targeting Them

Cybersecurity Firm: What US Journalists Need To Know About The Foreign Hackers Targeting Them

Photo illustration of a computer hacker. getty In the days just before the January 6 attack at the US Capitol Building in 2021, a flurry of emails with seemingly anodyne subject lines started landing in the inboxes of White House correspondents and other journalists who cover national politics. Those subject lines, pulled from recent US news articles, read like quick blasts of news filtered through a distinctly partisan lens: US issues Russia threat to China….

Read More

Council Post: How Your Employees’ Data Puts Your Business At Risk

Council Post: How Your Employees’ Data Puts Your Business At Risk

Global Resident Chief Information Security Officer (CISO) for Proofpoint. getty We live in a digital world where data is the new currency for both businesses and cybercriminals. Many online service providers collect massive amounts of consumer data—and threat actors can use this data to breach your organization. Even an attack on a consumer service may have dangerous implications for your business. You need to understand what kind of data is collected by the digital tools…

Read More

The Importance of Cybersecurity in Protecting Patient Safety | Healthcare IT Today

The Importance of Cybersecurity in Protecting Patient Safety | Healthcare IT Today

When we talk about cybersecurity, we often like to talk about the financial elements of a breach.  No doubt the financial impact is extremely important and can cost an organization dearly if they’re not prepared.  You also often hear about the reputation impact a breach has on an organization when the breach hits the local news and their organization lives in infamy on the HHS wall of shame.  What we hear less talk about is…

Read More

Report highlights strange and unusual tactics scammers use to steal data

Report highlights strange and unusual tactics scammers use to steal data

Cyber attackers are getting more creative as they choose their victims. For evidence, look no further than Proofpoint’s “Strangest Social Engineering Tactics of 2021,” released in early March. “They all gave us reason for concern,” said Ryan Kalember, the executive vice president of cybersecurity strategy at Proofpoint. “Just in terms of how much effort the attackers are putting into this, the labor that they use in order to do this, it means that their businesses…

Read More
1 2 3 4 5