CU InfoSecurity
Unknown date
Security
The webinar discusses the use of a Security Data Fabric for modernizing GRC processes by automating evidence collection and compliance controls. Attendees learn about the benefits of automation in improving efficiency and reducing risk.
CU InfoSecurity
Unknown date
Enforcement|guidance
• New HHS breach reporting website and guidance materials launched for substance use disorder record confidentiality. • Aligns with HIPAA privacy rule enforcement mandates effective as of Monday.
CU InfoSecurity
Unknown date
Hidden
Academic security researchers claim that 'zero knowledge encryption' guarantees by leading stand-alone password managers are overblown due to exploitable flaws. Vendors are patching these vulnerabilities, but the initial claims of invulnerability may mislead users.
CU InfoSecurity
Unknown date
Hidden
AI systems pose a significant risk of infrastructure collapse due to misconfiguration; Gartner predicts this could be the next major threat by 2028. Credit unions need to ensure robust AI governance and monitoring.
CU InfoSecurity
Unknown date
Guidance
The webinar discusses the importance of continuous assurance for real-time risk visibility to boards. It emphasizes the need for proactive risk management strategies.
CU InfoSecurity
Unknown date
Hidden
Peter Steinberger joins OpenAI to lead development of personal agents; his OpenClaw project faced security concerns due to potential misuse by hackers.
CU InfoSecurity
Unknown date
Hidden
• Countries are investing in region-specific AI platforms by 2027 to reduce dependence on US-China dominance.
• Nations are treating LLMs as critical infrastructure, similar to how they protect other vital resources.
CU InfoSecurity
Unknown date
Guidance
The webinar focuses on ensuring data disposal practices meet audit standards in a compliance-intensive environment. Participants learn how to manage and dispose of data securely to avoid regulatory issues.
CU InfoSecurity
Unknown date
Security
• RMM tools can be exploited by hackers using ransomware variants like VoidCrypt. • Cybersecurity firm Huntress highlights the risks associated with RMM tools, which are simultaneously open to remote connections and have privileged...
CU InfoSecurity
Unknown date
Hidden
Proofpoint acquires Acuvity to address generative AI risks and prompt injection attacks; intent-based guardrails and deep AI forensics will be used to secure AI tools.
CU InfoSecurity
Unknown date
Hidden
CIOs report increasing pressure to demonstrate ROI for AI projects; growing fatigue and stalled pilots are common issues. The article suggests a coming reckoning in the AI space, where the focus on return on...
CU InfoSecurity
Unknown date
Enforcement
TX
- The Texas attorney general has launched an investigation into Conduent Business Services and BCBS Texas following a significant data breach affecting 15.5 million Texans. - This incident could potentially break U.S. data breach...
CU InfoSecurity
Unknown date
Hidden
OpenAI is testing digital advertising as a revenue source due to its revenue gap; Anthropic has rejected ads amid rising compute costs. The effectiveness of ads in maintaining user engagement remains uncertain.
CU InfoSecurity
Unknown date
Hidden
Check Point acquires three startups to enhance AI security and exposure management; includes agentic AI, internal asset attack surface management, and MSP-focused unified management tools.
CU InfoSecurity
Unknown date
Hidden
UK Cybersecurity Agency issues a severe cyberthreat alert following the targeting of Poland's energy grid by Russian nation-state attackers; urges critical infrastructure operators to enhance their resilience and recovery plans.
CU InfoSecurity
Unknown date
Hidden
The U.K. NCSC's new guidance outlines four connectivity principles for utilities to enhance cyber resilience and avoid costly retrofits. OT weaknesses are prevalent, with 22% of critical infrastructure firms reporting OT incidents, driven by...
CU InfoSecurity
Unknown date
Security
State-backed hackers weaponized Google's Gemini AI for cyberattacks; Google has disabled accounts and strengthened defenses. Cybersecurity measures should be reviewed and updated.
CU InfoSecurity
Unknown date
Security
• Agentic AI is transforming security models faster than traditional defenses can keep up.
• Organizations will shift from deterministic risk models to adaptive, autonomous systems by 2026.
CU InfoSecurity
Unknown date
Hidden
India's e-rupee pilot demonstrates strong adoption with RBI standards and HSM security; awareness, interoperability, and encryption key to CBDC success and PQC readiness.
CU InfoSecurity
Unknown date
Security
Bretton AI has raised $75 million for scaling AI solutions in anti-money laundering and KYC compliance; the technology aims to reduce manual investigations and improve auditability.
CU InfoSecurity
Unknown date
Guidance
The webinar focuses on ensuring data disposal practices meet audit standards in the current high-risk compliance environment. Participants learn how to prepare for audits by properly managing and disposing of sensitive information.
CU InfoSecurity
Unknown date
Hidden
CISA issued a warning about operational technology (OT) risks following the Polish grid hack. Microsoft patched zero-day vulnerabilities, and there were reports of various cyber incidents including ransomware attacks and data breaches.
CU InfoSecurity
Unknown date
Security
Bretton AI has raised $75 million for automating AML compliance; targets large banks with reduced manual investigations and improved auditability.
CU InfoSecurity
Unknown date
Hidden
• Two data repositories lack proper access controls and incident response plans.
• Millions of Utahans' sensitive personal and health information may be at risk.
CU InfoSecurity
Unknown date
Hidden
- The role of Chief Information Officers (CIOs) is evolving from operational maintenance to strategic leadership in technology. - McKinsey's Global Tech Agenda 2026 suggests a shift towards CIOs playing a more significant role...