The debate between pure-play cloud security solutions and integrated platforms intensifies as the market consolidates. While pure-play vendors such as Wiz offer innovation and deep functionality, platforms such as Palo Alto Networks and CrowdStrike provide cost-effective and comprehensive options.
Federal regulators are reminding healthcare providers, insurers and other regulated firms of their duty to ensure that AI and other emerging technologies for clinical decision making and patient support are not used in a discriminatory manner - and comply with HIPAA.
Many organizations are looking to artificial intelligence agents to autonomously perform tasks that surpass traditional automation. Tech firms are rolling out agentic AI tools that can handle customer-facing interactions, IT operations and a variety of other processes without human intervention, but experts are...
British Prime Minister Keir Starmer unveiled a plan for converting the United Kingdom into an artificial intelligence "world leader," allowing it to shape the next phase of the "AI revolution." Key recommendations include creating multiple AI growth zones and a national data library.
A recent report found that more than 57,000 Americans fall victim to scams every day. Financial fraud is rising globally. In response, the National Automated Clearinghouse Association is pushing for real-time fraud monitoring by 2026, requiring closer collaboration between fraud and AML teams.
Microsoft filed a lawsuit targeting a cybercrime service used to generate "thousands of harmful images" by subverting the guardrails built into its Azure generative artificial intelligence tools. The company said attackers built a tool that reverse-engineered the guardrails in its AI platform.
Alterya's AI agents now power Chainalysis' fraud prevention, integrating off-chain data sources such as Venmo and Zelle with blockchain analytics. This acquisition marks a significant step in detecting and stopping scams earlier in the fraud cycle, said Chainalysis CEO Jonathan Levin.
U.S. export controls slated for publication Monday aim to block foreign adversaries from accessing American advanced computing chips and blueprints for machine learning models. Nvidia and industry leaders have criticized the policy, warning it may harm innovation.
Chinese hackers reportedly breached a U.S. government office responsible for reviewing foreign investments for national security threats as part of a cyberespionage campaign targeting the Department of Treasury. Hackers gained access to the Committee on Foreign Investment in the U.S.
The White House's reported final push to impose tighter restrictions on global semiconductor exports, including artificial intelligence chips critical for data centers, has drawn strong criticism from Nvidia and the semiconductor industry in the last days of the administration.
In this week's update, ISMG editors discuss the escalating geopolitical cyberthreats expected in 2025, including advanced and persistent campaigns linked to Chinese actors. Panelists also pay tribute to Amit Yoran, one of the cybersecurity industry's most influential leaders.
With 10 days left in office, the Biden administration releases an artificial intelligence strategic plan for the U.S. Department of Health and Human Service. HHS calls the plan a "comprehensive roadmap," outlining the department's "commitment to trustworthy, ethical and equitable AI use."
Tampa General Hospital has agreed to pay $6.8 million to settle a proposed consolidated federal class action lawsuit filed in the wake of the 2023 data theft incident affecting about 2.1 million people. How might a potential update to the HIPAA Security Rule affect similar lawsuits moving forward?
Three Russian nationals behind cryptocurrency mixers favored by ransomware hackers and North Korean crypto thieves face criminal charges in U.S. federal court: Roman Vitalyevich Ostapenko, 55, Alexander Evgenievich Oleynik, 44, and Anton Vyachlavovich Tarasov, 32.
To combat AI threats in 2025, security teams are set to enter the second phase of AI innovation in security by deploying semi-autonomous operations such as alert parsing, creation of high-priority item lists and risk remediation, said Jamie Collier, senior threat intelligence advisor at Mandiant.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.