IAM's Role in the Pharmaceutical Sector

Data Breach Today

Sandy Dalal of Allergan on Achieving Security Stability Mergers and acquisitions, along with cloud adoption, are rapidly changing the pharmaceutical industry. Sandy Dalal of Allergan talks about how identity and access management, along with zero trust, are bringing security stability

Pharmaceutical companies exploited by phishing scam targeting job seekers

IT Governance

Earlier this month, two major pharmaceutical giants issued warnings about phishing emails targeting job hunters. The post Pharmaceutical companies exploited by phishing scam targeting job seekers appeared first on IT Governance Blog. Cyber Security phishing

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Pharmaceutical Company to Plead Guilty and Settle Drug Marketing Charges

Hunton Privacy

Recently, Aegerion Pharmaceuticals announced that it will enter into several settlements and plead guilty to two misdemeanors in connection with alleged violations of HIPAA, drug marketing regulations and securities laws. Aegerion will also pay $40 million to settle claims by the Department of Justice and Securities and Exchange Commission, and enter into a deferred prosecution agreement related to alleged violations of HIPAA.

Safeguarding COVID-19 Research, Other Intellectual Property

Data Breach Today

As cyberthreats to medical research on COVID-19 - and other intellectual property - grow, organzations must take critical steps to prevent the theft of their "innovation capital," says Russell Koste, chief security officer of Alexion Pharmaceuticals

Alert: APT Groups Targeting COVID-19 Researchers

Data Breach Today

are warning medical institutions, pharmaceutical companies, universities and others about "password-spraying campaigns" by advance persistent threat groups seeking to steal COVID-19 research data. Security experts outline defensive steps that organizations can take

Google Yanks 106 ‘Malicious’ Chrome Extensions

Threatpost

Trojan Chrome browser extensions spied on users and maintained a foothold on the networks of financial services, oil and gas, media and entertainment, healthcare and pharmaceuticals and government organizations.

The hidden threats facing your intellectual property

IT Governance

For life sciences and pharmaceutical companies, this includes data on the development and testing of new therapies and details of how therapies are manufactured. Cyber Resilience Healthcare Intellectual Property Life Sciences Pharmaceutical

Maintaining Regulatory-Compliant Cloud Solutions

Perficient Data & Analytics

But there are also several risks to consider, including physical and technical security, privacy and confidentiality, technical support, enhancements, application uptime/availability, vendor stability, and data mobility – the ability to extract data from the system.

Cloud 45

Key Takeaways About Compliant IT Systems In The Cloud

Perficient Data & Analytics

Key topics include: Physical security. Data security, privacy, and confidentiality. Cloud Data & Analytics Digital Transformation Integration & IT Modernization Life Sciences Operations Regulatory Compliance Strategy 21 CFR Part 11 clinical cloud compliance Data hosting IaaS medical device PaaS pharmaceutical Regulatory SaaS Software Systems technologyThis is the final post in our series on maintaining regulatory-compliant IT systems in the cloud.

Cloud 40

How To Qualify Cloud Vendors

Perficient Data & Analytics

Because the ultimate responsibility for regulatory compliance lies with you – the pharmaceutical or medical device company – you need to be much more proactive and critical. When qualifying a cloud vendor, be sure to evaluate their written procedures and the documented evidence that they follow their procedures in the following key areas: Security of the physical space, which houses the servers that host IaaS, PaaS, and/or SaaS products, even if that space is in a third-party data center.

Cloud 40

Coronavirus: Europol arrests man behind €6M face masks and hand sanitisers scam

Security Affairs

million by a European pharmaceutical company, a European State reported. “A European Member State reported to Europol that one of their pharmaceutical companies had been defrauded of €6.64

68% of Pharma Executives Have Had Credentials Breached Online

Adam Levin

The online credentials for 68% of pharmaceutical executives analyzed for a study have been compromised recently. Every day the executive brings their company home, where the security controls are nonexistent and weak ? Data Security Cybersecurity featured linkedin pharma

Q&A: The drivers behind the stark rise — and security implications — of ‘memory attacks’

The Last Watchdog

Related: Memory hacking becomes a go-to tactic These attacks are referred to in the security community as “fileless attacks” or “memory attacks.” I had the chance at RSA 2019 to discuss memory hacking with Willy Leichter, vice president of marketing, and Shauntinez Jakab, director of product marketing, at Virsec , a San Jose-based supplier of advanced application security and memory protection technologies.

Hundreds of malicious Chrome browser extensions used to spy on you!

Security Affairs

Malicious Chrome browser extensions were used in a massive surveillance campaign aimed at users working in the financial services, oil and gas, media and entertainment, healthcare, government organizations, and pharmaceuticals. ” reads the analysis published by Awake Security.

How To Use Contracts For Regulatory Compliance Of Cloud Systems

Perficient Data & Analytics

Security. What will the cloud vendor do to proactively protect security, and what will it do if security is breached in some way? This includes: physical security, cyber security (e.g., Cloud Data & Analytics Digital Transformation Integration & IT Modernization Life Sciences Operations Regulatory Compliance Strategy 21 CFR Part 11 clinical cloud compliance Data hosting IaaS medical device PaaS pharmaceutical Regulatory SaaS Software Systems technology

Security in a World of Physically Capable Computers

Schneier on Security

Security is not a problem the market will solve. The primary reason computers are insecure is that most buyers aren't willing to pay -- in money, features, or time to market -- for security to be built into the products and services they want. It's no secret that computers are insecure.

Operation Pangea: Europol dismantles criminal gangs selling coronavirus medicine, surgical masks

Security Affairs

Below the operation in numbers reported by the Europol: 121 arrests; €13 million in potentially dangerous pharmaceuticals seized; 326 00 packages inspected; 48 000 packages seized; 4.4

Information security and compliance training for the healthcare sector

IT Governance

Pharmacies, rehabilitation care, social care, medical research and pharmaceuticals all rely on this data being available to individuals delivering their services. and healthcare must address the new DSP (Data Security and Protection) Toolkit.

New financially motivated attacks in Western Europe traced to Russian-speaking threat actors

Security Affairs

At least two companies operating in pharmaceutical and manufacturing sectors have been affected. MainModule can be explained by the gang’s attempts to avoid detection as a result of being in the spotlight of security researchers for some time now.”

Hackers target German Task Force for COVID-19 PPE procurement

Security Affairs

“The remaining half belong to executives at third-party partners, including European and American companies associated with chemical manufacturing, aviation and transport, medical and pharmaceutical manufacturing, finance, oil and gas, and communications.”

China-linked Winnti APT targets South Korean Gaming firm

Security Affairs

Security experts from QuoIntelligence (QuoINT) firm reported that China-linked Winnti cyberespionage group targets South Korean video gaming company Gravity. The post China-linked Winnti APT targets South Korean Gaming firm appeared first on Security Affairs.

Europol seized 30,506 Internet domain names for IP Infringement

Security Affairs

some private security firms. “These included counterfeit pharmaceuticals and pirated movies , illegal television streaming, music, software, electronics, and other bogus products.”

Europe’s Largest Private Hospital Operator Fresenius Hit by Ransomware

Krebs on Security

“I can confirm that Fresenius’ IT security detected a computer virus on company computers,” Kuhn said in a written statement shared with KrebsOnSecurity.

China-linked APT41 group exploits Citrix, Cisco, Zoho flaws

Security Affairs

Victims operate in the Banking/Finance, Construction, Defense Industrial Base, Government, Healthcare, High Technology, Higher Education, Legal, Manufacturing, Media, Non-profit, Oil & Gas, Petrochemical, Pharmaceutical, Real Estate, Telecommunications, Transportation, Travel, and Utility. . The post China-linked APT41 group exploits Citrix, Cisco, Zoho flaws appeared first on Security Affairs.

Europol analyses on criminal operations in Europe during COVID-19 Crisis

Security Affairs

Europol continues to observe on a daily base the trading of counterfeit pharmaceutical and healthcare products. Please vote Security Affairs for European Cybersecurity Blogger Awards – VOTE FOR YOUR WINNERS [link].

Malvertising campaign exploits recently disclosed WordPress Plugin flaws

Security Affairs

Experts at Defiant, the company that developed the Wordfence security plugin for WordPress, uncovered a malvertising campaign that leverages recently disclosed plugin flaws to inject malicious code into websites.

Chronicle experts spotted a Linux variant of the Winnti backdoor

Security Affairs

Security researchers from Chronicle, Alphabet’s cyber-security division, have spotted a Linux variant of the Winnti backdoor. Security experts from Chronicle, the Alphabet’s cyber-security division, have discovered a Linux variant of the Winnti backdoor.

Winnti uses a new PipeMon backdoor in attacks aimed at the gaming industry

Security Affairs

The APT group targeted organizations in various industries, including the aviation, gaming, pharmaceuticals, technology, telecoms, and software development industries. The post Winnti uses a new PipeMon backdoor in attacks aimed at the gaming industry appeared first on Security Affairs.

German firms BASF, Siemens, Henkel hit by cyber attacks

Security Affairs

Recently Chronicle researchers while investigating the cyber attack that hit the Bayer pharmaceutical company in April spotted a Linux variant of the Winnti backdoor. The post German firms BASF, Siemens, Henkel hit by cyber attacks appeared first on Security Affairs.

More Attacks against Computer Automatic Update Systems

Schneier on Security

Also, our experts identified three additional victims: another video gaming company, a conglomerate holding company and a pharmaceutical company, all in South Korea. Me on supply chain security.

Interpol warns that crooks are increasingly targeting hospitals

Security Affairs

According to experts from Group-IB, Russian-speaking threat actors targeted at least two companies in Western Europe in the pharmaceutical and manufacturing industries. The post Interpol warns that crooks are increasingly targeting hospitals appeared first on Security Affairs.

Encryption – A Feasible Savior against Prevalent Privacy Issues in Business Communication

Security Affairs

Impact of Privacy & Security Issues in Business Communication. Encryption plays an integral role in securing the online data as well as its integrity. Similarly, they should use business VPN services , such as PureVPN , to create a secure channel for their remote employees.

Exclusive Cybaze ZLab – Yoroi – Hunting Cozy Bear, new campaign, old habits

Security Affairs

The researchers of Yoroi ZLab, on 16 November, accessed to a new APT29’s dangerous malware which seems to be involved in the recent wave of attacks aimed at many important US entities, such as military agencies, law enforcement, defense contractors , media companies and pharmaceutical companies.

NEW TECH: How Semperis came to close a huge gap in Active Directory disaster preparedness

The Last Watchdog

Semperis is a security company, launched in 2014, that is entirely focused on AD – or, to put it more precisely, on delivering state-of-art AD cyber resilience, threat mitigation and rapid recovery from cyber breaches.

Cybaze ZLab – Yoroi team analyzed malware used in recent attacks on US entities attributed to APT29

Security Affairs

The researchers of Yoroi ZLab, on 16 November, accessed to a new APT29’s dangerous malware which seems to be involved in the recent wave of attacks aimed at many important US entities, such as military agencies, law enforcement, defense contractors , media companies and pharmaceutical companies.

Supply chain failure – the impact on the patient

IT Governance

In healthcare, however, securing the supply chain can also be a matter of life and death. The fundamental goal of information security management is protecting information – specifically, its confidentiality, integrity and availability – on which everything else depends.

US DoJ indicts Chinese hackers over state-sponsored cyber espionage

Security Affairs

“Zhu and Zhang were members of a hacking group operating in China known within the cyber security community as Advanced Persistent Threat 10 (the APT10 Group).” Both defendants worked for a company in China named Huaying Haitai Science and Technology Development Company (Huaying Haitai) and acted under the direction of Tianjin State Security Bureau, a department of China’s Ministry of State Security.

Data Intelligence and Its Role in Combating Covid-19

erwin

Privately it will come from hospitals, labs, pharmaceutical companies, doctors and private health insurers. Data intelligence has a critical role to play in the supercomputing battle against Covid-19.

BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

The Last Watchdog

Its customer base is comprised of eight of the top 15 banks, four of the top six healthcare insurance and managed care providers, nine of the top 15 property and casualty insurance providers, five of the top 13 pharmaceutical companies, and 11 of the largest 15 federal agencies. The key security lesson is that an identity gets assigned to each and every RPA, creating fresh attack vectors.

Episode 158: How NotPetya has Insurers grappling with Systemic Cyber Risk

The Security Ledger

Related Stories Episode 155: Disinformation is a Cyber Weapon and APTs warm to Mobile Malware Podcast Episode 117: Insurance Industry Confronts Silent Cyber Risk, Converged Threats NotPetya Horror Story Highlights Need for Holistic Security. Read Security Ledger coverage of NotPetya here.