433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Building a healthcare cybersecurity strategy that works

In this Help Net Security interview, Wayman Cummings, CISO at Ochsner Health, talks about building a healthcare cybersecurity strategy, even when resources are tight. He explains how focusing on areas like vulnerability management and network segmentation can make the biggest difference. Cummings also shares how balancing investments across people, processes, and technology can strengthen both resilience and patient trust. When building a healthcare cybersecurity strategy, where should leaders start, especially if resources are limited? Senior … More → The post Building a healthcare cybersecurity strategy that works appeared first on Help Net Security.
http://news.poseidon-us.com/TNdmmb

AI-generated images have a problem of credibility, not creativity

GenAI simplifies image creation, yet it creates hard problems around intellectual property, authenticity, and accountability. Researchers at Queen’s University in Canada examined watermarking as a way to tag AI images so origin and integrity can be checked. Watermarking scenario overview for GenAI Building the framework A watermarking system operates as a complete security process with several essential parts: embedding, verification, attack channels, and detection. It starts when a coded message is placed inside an image … More → The post AI-generated images have a problem of credibility, not creativity appeared first on Help Net Security.
http://news.poseidon-us.com/TNdmmZ

The five-minute guide to OT cyber resilience

In this Help Net Security video, Rob Demain, CEO of e2e-assure, explains the essentials of OT cybersecurity resilience. He discusses the importance of understanding remote access points, supply chain connections, and the need for specialized sensors to monitor OT networks that differ from traditional IT systems. Demain emphasizes knowing what normal behavior looks like, linking changes to management systems, and maintaining accurate asset inventories. Demain concludes that availability is the top priority in OT, and … More → The post The five-minute guide to OT cyber resilience appeared first on Help Net Security.
http://news.poseidon-us.com/TNdmkd

When hackers hit, patient safety takes the fall

93% of U.S. healthcare organizations experienced at least one cyberattack in the past year, with an average of 43 incidents per organization, according to Proofpoint. The study found that most of these attacks involved cloud account compromises, ransomware, supply chain intrusions, and business email compromise. 72% of respondents said at least one incident disrupted patient care. Patient care takes the hit The findings link attacks to poor clinical outcomes and, in some cases, higher patient … More → The post When hackers hit, patient safety takes the fall appeared first on Help Net Security.
http://news.poseidon-us.com/TNdjh8

Attackers don’t linger, they strike and move on

Cyber attacks are happening faster than ever. Intrusions that once took weeks or months now unfold in minutes, leaving little time to react. Attackers move quickly once they gain access, aiming to run their payloads and get results before defenders can respond, according to Elastic. Execution takes the lead Global telemetry shows that on Windows systems, the “Execution” tactic now accounts for 32% of malicious activity, surpassing “Defense Evasion,” which led for three consecutive years. … More → The post Attackers don’t linger, they strike and move on appeared first on Help Net Security.
http://news.poseidon-us.com/TNdjgC