Remove Cyber threats Remove Digital transformation Remove Insurance
article thumbnail

Krispy Kreme Cyber Attack a Wake-Up Call for the Food Industry

SecureWorld News

The shift to digital experiences and customer service in industries that were historically only brick-and-mortar underscores how rapid digital transformation expands the attack surface for cybercriminals. All the new points of sale (POS) and customer touchpoints increase the access points that bad actors can exploit.

article thumbnail

These are the 15 Top Cyber Threats Now

SecureWorld News

Sometimes when you are down in the cyber attack trees defending your organization, it can be tough to see the cyber threat forest. Understanding how things are shifting in the forest, or overall threat landscape, can help us categorize, strategize, and prioritize our resources. What are the top cyber threats right now?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Thales OneWelcome Identity Platform and HIPAA Compliance in 2025

Thales Cloud Protection & Licensing

Thales OneWelcome Identity Platform and HIPAA Compliance in 2025 madhav Wed, 03/19/2025 - 05:58 The Health Insurance Portability and Accountability Act (HIPAA) has undergone significant changes in 2025, introducing enhanced requirements to address growing cyber threats and ensure comprehensive data protection.

article thumbnail

The State of Digital Trust in 2025 - Consumers Still Shoulder the Responsibility

Thales Cloud Protection & Licensing

The State of Digital Trust in 2025 - Consumers Still Shoulder the Responsibility madhav Thu, 03/20/2025 - 04:52 Trust remains the cornerstone of digital interactions, yet its foundations are increasingly fragile in an era of sophisticated cyber threats and evolving consumer expectations.

article thumbnail

Q&A: Why SOAR startup Syncurity is bringing a ‘case-management’ approach to threat detection

The Last Watchdog

Now toss in the fact that digital transformation is redoubling software development and data handling complexities. This has exponentially expanded the attack surface available to motivated, well-funded threat actors. LW: How has ‘digital transformation’ exacerbated the need for SOAR?

article thumbnail

Simplifying Compliance in the Complex U.S. FinServ Regulatory Landscape

Thales Cloud Protection & Licensing

Some of the most important are Gramm-Leach-Bliley Act ( GLBA ), the National Association of Insurance Commissioners ( NAIC ) Data Security Model Law, the New York Department of Financial Services ( NYDFS ) Cybersecurity Regulation, and the National Credit Union Administration ( NCUA ) cybersecurity guidance.

article thumbnail

HHS Office for Civil Rights Proposes Measures to Strengthen Cybersecurity in Health Care Under HIPAA

Thales Cloud Protection & Licensing

These numbers highlight the widespread and growing threat to patient safety and privacy, underscoring the urgent need for stronger protections. They aim to ensure healthcare organizations are prepared to face todays increasingly sophisticated cyber threats. In 2023 alone, over 167 million people were affected.