Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyberattacks on Hospitals Are Attacks on Communities: Why Ransomware Is a Patient Safety Crisis

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell speaks with John Riggi, National Advisor for Cybersecurity and Risk at the American Hospital Association. Drawing on nearly 30 years at the FBI and his current work advising more than 5,000 hospitals, Riggi explains why ransomware attacks on healthcare should be treated as threat-to-life events. He breaks down the real-world consequences of cyberattacks, from ambulance diversion to delayed cancer care, and outlines what leaders must do now to prepare for outages that last weeks, not hours.

How it feels to track down customer commitments

Most organizations have commitment issues. Like tracking all your customer obligations on sticky notes, Slack threads, email chains, screenshots, whiteboards, and spreadsheets. Why not save yourself the scavenger hunt and, you know, just use Vanta? Customer Commitments is a security intelligence layer that pulls critical SLAs out from legalese, and surfaces the commitments that actually matter with the Vanta AI Agent. Helping you centralize + operationalize every promise—so revenue and reputation aren’t on the line.

Prompt Injection Attacks: Why AI Security Starts with IAM

AI agents are rewriting the rules of efficiency, but one hidden flaw could turn them against you. Prompt injection attacks let hackers hijack your AI, steal data, and break safeguards straight through everyday inputs. No code exploit is required, only a clever manipulation. Identity and Access Management (IAM) plays a massive role in AI security to protect at first hand.

Amazon EC2 security: How misconfigured and public AMIs expand your cloud attack surface

Amazon Machine Images (AMIs) are templates for launching and scaling Amazon Elastic Compute Cloud (EC2) instances. Because Amazon EC2 AMIs are reused across environments and automation pipelines, decisions about how you build, source, manage, and share them directly affect your cloud attack surface.

AI Risk Management: Process, Frameworks, and 5 Mitigation Methods

AI risk management is the process of identifying, assessing, and mitigating risks associated with artificial intelligence systems to ensure they are developed and used responsibly. It involves using frameworks like the NIST AI Risk Management Framework to address technical, ethical, and social challenges, including data bias, privacy violations, and security vulnerabilities.

Securonix Threat Labs Monthly Intelligence Insights | January 2026

Authors: Dheeraj Kumar and Nitish Singh The Monthly Intelligence Insights report provides a summary of top threats curated, monitored, and analyzed by Securonix Threat Labs in January 2026. The report also includes a synopsis of the threats, indicators of compromise (IoCs), tactics, techniques, and procedures (TTPs), and related tags. Each threat has a comprehensive summary from Threat Labs and search queries from the Threat Research team.