Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

462k Hawaiians and Patients Exposed by Health Network Cyberattack

Navvis & Company is a comprehensive healthcare network throughout the US, including Hawaii. They offer scalable healthcare services that push patients towards their health and wellness goals while supporting providers’ roles to achieve those milestones. In the middle of last year, mid-July, Navvis experienced a cyberattack; their experts responded, but not before the assailants got away with 462,861 records—and that’s just from Hawaii.

What Is a Passkey Manager?

A passkey manager is a tool that aids users in generating, storing and managing the passkeys they use to log in to their accounts. There are many types of passkey managers available on the market, including ones that come built into your devices, browser-based passkey managers and dedicated passkey managers that allow you to access your passkeys from anywhere. Continue reading to learn more about what passkey managers are and why you should use them to store your passkeys.

Weekly Cybersecurity Recap February 16

This week was particularly active in Cybersecurity—attacks rained upon all states, from the Great Basin of Nevada to the Volcanoes of Hawaii. The week began with an announcement out of Texas: U.S. Renal Care found exposed information from a vendor breach in 2023, impacting over 132k patients. Connecticut College was also featured this week; investigations are ongoing, but victims shouldn’t wait to protect themselves. The public also got an update on the PJ&A data breach from 2023.

EU AI Act Developments and More - This Month in AI

In a historic move, European Union member countries have unanimously agreed on the groundbreaking Artificial Intelligence Act. This achievement comes after overcoming last-minute concerns that the rulebook might impede European innovation. The EU deputy ambassadors provided the green light to the final compromise text, marking the conclusion of extensive negotiations between the Council, European Parliament members, and European Commission officials.

How Can Continuous Asset Monitoring Protect Critical Assets?

The increase in cyberattacks increases year-on-year with attacks being more and more sophisticated. It’s a daunting task for security teams to adapt security strategies to proactively mitigate threats against the backdrop of a shortage of cybersecurity talent and budgets stretched. This is leading to organisations adopting proactive defence strategies using tools with continuous monitoring capabilities.

Maximising Efficiency: The Essential Guide to IoT Monitoring in 2024

When it comes to IoT, monitoring is not optional but mandatory for success. This comprehensive guide demystifies IoT monitoring in plain language—learn why it’s essential, which components need your attention, and how to implement it effectively. Prevent costly downtimes, secure your network, and gain unparalleled control over your IoT ecosystem.

Top tips: Four ways to protect your organization from increasingly advanced social engineering attacks

Top tips is a weekly column where we highlight what’s trending in the tech world and list ways to explore these trends. This week we’re looking at four ways you can protect yourself from increasingly advanced social engineering attacks.

Mitigate vulnerabilities from third-party libraries with Datadog Software Composition Analysis

Mitigating application vulnerabilities throughout the software development life cycle (SDLC) is critical—and challenging, especially as applications rely more and more on third-party, open source software (OSS). With this type of architecture, teams often don’t know exactly where vulnerabilities exist in their code, which of those vulnerabilities are actively exposed in production services, and which vulnerabilities are more critical to address than others.