Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyber Resilience in Healthcare: Why Recovery Starts at the Endpoint

On this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, Nelson Carreira explains why recovery planning in healthcare has to consider the entire environment, from user devices to network architecture. In large incidents, the blast radius can extend far beyond servers, sometimes forcing organizations to rebuild tens of thousands of endpoints before operations can safely resume. As he puts it.

Are attacks on industrial systems increasing? #cybersecurity #podcast #OT

Public awareness of industrial system attacks is finally catching up to what security professionals have known for years. On The Cybersecurity Defenders Podcast, Justin Searle, Director of ICS Security at InGuardians, traces the shift from Conficker in 2008 taking out OT systems on flat networks to Stuxnet in 2010 making the warfare implications clear. Since then, awareness among governments and critical infrastructure operators has grown steadily, and so have the attacks.

See, Govern, and Secure All AI Usage in Your Enterprise

Do you happen to know which AI tools your employees are using right now, or what data they're sending into them? Cato AI Security automatically discovers every AI application in your environment, provides security teams with session-level visibility into how those tools are being used, and enforces data policies in real time, so employees can keep working and sensitive data stays where it belongs.

What Happens When Healthcare Systems Go Dark

• What happens inside a healthcare system when ransomware takes down Active Directory and authentication fails? In this episode, Josh Howell sits down with Nelson, Executive Healthcare Strategist at CDW, to explore real-world cyber incidents and the architectural shifts required to recover safely. You’ll learn: YouTube Chapters Final Lessons for Healthcare Leaders If you enjoyed this episode, be sure to subscribe to our YouTube channel.

Understanding Malicious Packages in Modern Software Supply Chains

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.