Richard Harrison, CISO at healthAlliance in New Zealand, is focused on visibility and "security by design" from initiation through design-build-operate process, to achieve excellence in security operations
Implementing the "zero trust" model in the OT environment can prove to be more difficult than in the IT environment because many OT systems are older, cannot easily be replaced and may be difficult to monitor, according to two experts.
Israel-based digital intelligence company Cellebrite is halting sales to Bangladesh, citing human rights concerns. The move comes after the U.N. on Friday called for a moratorium on the sale of "life-threatening" surveillance technology, singling out Israel's NSO Group for criticism.
Some cybersecurity leaders are finding that when it comes to retaining workers, offering a solid work-life balance and defining a career growth path is more important than salary.
T-Mobile USA has confirmed that its systems were breached and that details for 7.8 million current T-Mobile postpaid customers and 850,000 prepaid customers as well as records for 40 million individuals who applied for credit were stolen.
Sustaining growth in the cybersecurity field will require recruiting those from diverse backgrounds, says Charmaine Valmonte, vice president, IT security and IT infrastructure, at Aboitiz Group, a Philippines-based conglomerate.
FireEye researchers and CISA are warning about a critical vulnerability that could allow an attacker to gain remote access to compromised IoT devices, such as connected security cameras, according to a report. The flaw could affect millions of connected devices.
An identity and access management strategy for a distributed work environment must leverage advanced monitoring tools, according to a panel of experts who also offered other IAM insights
T-Mobile USA has confirmed that attackers accessed its computer systems, but the mobile communications provider is still investigating whether customers' personal data was exposed. Cybercrime experts say the attackers apparently involved have been tied to previous crimes targeting telecommunications since at least...
Scientists from the University of Maryland and the University of Colorado Boulder say they have discovered a new way that attackers could launch reflected denial-of-service amplification attacks over TCP by abusing middleboxes and censorship infrastructure.
A group of cybersecurity professionals has launched Respect in Security to take a stand against all forms of harassment within the industry. Initiative co-founders Lisa Forte and Rik Ferguson describe their commitment to creating workplaces free from harassment and fear.
The ransomware attack that targeted Colonial Pipeline Co. in May compromised the personal information of more than 5,800 individuals, mainly current and former employees, according to a breach notification letter.
T-Mobile USA says it is investigating a claim that as many as 100 million accounts may have been compromised in a data breach. The person who claims responsibility for the alleged breach says T-Mobile misconfigured a Gateway GPRS Support Node.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.