Allegheny Health Network (AHN) disclosed today that a cybersecurity incident involving its IT vendor, IntraSystems, LLC, resulted in unauthorized access to systems supporting AHN’s Home Medical Equipment and Home Infusion subsidiaries.
New York-based law firm Wolf Haldenstein Adler Freeman & Herz said it experienced a significant cyber security incident that compromised the sensitive personal information of almost 3.5 million individuals.
GoDaddy, a leading website hosting provider serving approximately five million customers, has come under scrutiny from the Federal Trade Commission (FTC) for failing to secure its services over a prolonged period adequately.
In his administration’s closing days, President Joe Biden has signed a sweeping executive order aimed at strengthening the United States’ cybersecurity posture.
Leading Dutch institution Eindhoven University of Technology says it has been unable to resume normal operations and classes after it suffered a significant cyber attack over the weekend.
The City of West Haven in the U.S. state of Connecticut suffered a serious cyber security incident that forced it to take several systems offline to mitigate the impact of the attack.
Hackney Council said that it has brought in a new housing management system that helps local authorities to manage housing related concerns following a devastating cyber attack it suffered in 2020.
Eindhoven University of Technology (TU/e), a leading Dutch institution and a vital academic partner for ASML Holding NV, has suspended all lectures and educational activities in response to a cyberattack that targeted its systems.
Not all processes have the same resilience needs. Trading floor processes usually have near-zero tolerance for disruptions, where millions of dollars may be lost if a commodity or currency trade cannot complete on time.
This is the first in a series of five articles on the importance of building and maintaining digital systems resilient to, and able to detect and respond to, operational threats (both accidental and malicious), and that are quick to recover and resume normal operations after an adverse event.