Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Healthcare IoT Security Breach 2025: Why Over 1 Million Devices Were Exposed

A recent healthcare IoT security breach exposed thousands of devices across multiple facilities, including connected medical devices and critical healthcare equipment used in hospitals. Sensitive patient information was compromised, putting not only privacy at risk but also threatening health insurance portability and compliance with the accountability act.

What is an AI Bill of Materials (AI BOM)?

What’s happening under the hood of your AI systems? AI is now a crucial element of modern software applications, and if you don’t have visibility into its components, you’ll be left blind. Similar to a Software Bill of Materials (SBOM), an AI Bill of Materials, AI BOM, or AIBOM has become a crucial framework for documenting and securing this new and complex supply chain. This article is part of a series of articles on Shadow AI.

How Protecto Helps Healthcare AI Agents Avoid HIPAA Violations

Despite being one of the most highly regulated industries, healthcare businesses are disproportionately impacted by breaches. IBM’s independent research centre, Ponemon Institute’s report on the cost of a data breach, healthcare continues to top the list for 12 consecutive years. AI agents are infiltrating every sector, healthcare is no exception.

AI Agents Vulnerabilities and Prompt #cybersecurity #aisecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Can ChatGPT Decode Exploit Data? You'll Be Surprised!

Can ChatGPT really make sense of exploit data? The answer is yes. In this clip, security expert Brian Johnson shows how ChatGPT decoded a hex-encoded payload and revealed the contents of a password file in seconds. Watch the full webinar to see how AI tools like ChatGPT are changing the penetration testing game.

JumpCloud vs. Kandji: Is Your IT Platform Built for a Diverse World?

Don’t settle for an Apple-only approach when your IT environment is diverse. This video reveals the critical difference between a single-focus point solution like Kandji and a unified platform that brings together identity, access, and device management. Learn why a holistic solution is essential for true UEM, controlling the entire user lifecycle, and ensuring a single secure identity for every resource in your multi-platform business.

10 Critical Capabilities of API Detection and Response

Web Application and API Protection (WAAP) solutions have become increasingly vital in today’s cybersecurity strategies, providing essential defenses against attacks targeting web applications and APIs. It’s no surprise that APIs are growing in popularity, with 80% of companies reporting that more than half of their applications depend on APIs—a figure projected to reach 88% within the next 24 months (ESG Research, 2025).

The New Frontier: Why You Can't Secure AI Without Securing APIs

The release of a new KuppingerCole Leadership Compass is always a significant event for the cybersecurity industry, offering a vendor-neutral view of the market's current state. The 2025 edition, focusing on API Security and Management, is critical as it arrives at a pivotal moment for technology. It clearly presents a fact many organizations are just beginning to understand: the crucial connection between the rise of Artificial Intelligence and the necessity for robust API security.

Responsible AI for improved security and better decision making

One Identity helps organizations strengthen cybersecurity, boost efficiency and control costs through the One Identity Fabric, a holistic approach to identity and access management (IAM). By unifying IAM tools, including identity governance and administration (IGA), access management (AM), privileged access management (PAM), and Active Directory management (AD Mgmt), it ensures optimal functionality and efficiency. This cohesive structure reduces identity sprawl and extends governance to the farthest endpoints of your IAM ecosystem.