article thumbnail

South African telecom provider Cell C disclosed a data breach following a cyberattack

Security Affairs

. “Cell C is aware that data compromised in the recent cybersecurity incident has been unlawfully disclosed by RansomHouse, the threat actor claiming responsibility.” “This follows a previously reported incident involving unauthorised access to unstructured data in some parts of our IT environment.”

article thumbnail

MediSecure data breach impacted 12.9 million individuals

Security Affairs

million Australians who used the MediSecure prescription delivery service during the approximate period of March 2019 to November 2023 are impacted by this Incident based on individuals’ healthcare identifiers. . “MediSecure can confirm that approximately 12.9 ” reads a company’s statement on cyber security incident.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Prepare for the Future of Healthcare Digital Security

Thales Cloud Protection & Licensing

In this blog post, I’ll discuss how healthcare enterprises can not only meet these challenges, but go beyond compliance to best practice to secure their data and their reputations. The Meaningful Use portion of the HITECH Act provided healthcare organizations a carrot to encourage the adoption of electronic health records.

article thumbnail

MediSecure data breach impacted 12.9 million individuals

Security Affairs

million Australians who used the MediSecure prescription delivery service during the approximate period of March 2019 to November 2023 are impacted by this Incident based on individuals’ healthcare identifiers. . “MediSecure can confirm that approximately 12.9 ” reads a company’s statement on cyber security incident.

article thumbnail

NEWS ANALYSIS Q&A: The early going of Generative AI and LLMs impacting cybersecurity

The Last Watchdog

These technologies enable our platform to process and analyze large amounts of structured and unstructured data, empowering our advanced threat intelligence and cybersecurity solutions. LW: Tell us a bit about Resecurity’s implementation. Loveland: We’ve integrated GenAI and LLM into our services platform.

article thumbnail

GUEST ESSAY: Recalibrating critical infrastructure security in the wake of evolving threats

The Last Watchdog

in different industries, including energy, manufacturing, and healthcare. A data diode facilitates a uni-directional stream of information from one device to another, preventing bi-directional data flow. A data guard, meanwhile, ensures that only the intended structured and unstructured data is transferred across these networks.

article thumbnail

How Machine Learning Can Accelerate and Improve the Accuracy of Sensitive Data Classification

Thales Cloud Protection & Licensing

Part of this process includes identifying where and how data is stored—on-premises, in third-party servers or in the cloud. While an organization might already know the location of structured data such as a primary customer database store, unstructured data (such as that found in stray files and emails) is more difficult to locate.