Orchestration and automation have shifted from "nice to have" to "must-have" in the enterprise - particularly post-breach, says Christine Vanderpool, CISO at Florida Crystals Corp. She and Splunk's Ryan Kovar share insights and tips on how to get maximum value from these emerging technologies.
Cyberespionage breaches take longer to discover than financial breaches. One of the biggest clues to finding them lies in understanding suspicious network traffic. John Grim of the Verizon Threat Research Advisory Center shares insight from a new study of cyberespionage trends.
Key challenges from the recent State of Cybersecurity 2021 report include "integrating risk with maturity and keeping up with industry trends," says Jenai Marinkovic, member of the ISACA Emerging Trends Working Group.
An Australian software engineer warns that he was able to create a fake digital COVID-19 vaccine certificate via the government's Express Medicare Plus app, and that the agency in charge has so far failed to acknowledge his bug report. He recommends Australia instead copy the EU's QR code system.
Implementing a "zero trust" framework for the healthcare sector requires gaining board support for implementing the right access management controls, according to a panel of experts.
Enterprises must have their ransomware response plan tested on a regular basis, and it must spell out specific steps on what to do in event of an attack, says John Shier, senor security adviser at Sophos.
When Conrad Bell joined C Spire, the cybersecurity team numbered one - him. Today he has a thriving team. The VP and CISO explains how he built it, describes the skills he values and tells how this team is helping the telecommunications firm respond to today's daunting cybersecurity challenges.
There’s no question: 2020 brought unanticipated changes and challenges for financial services. The notable surge in consumers’ use of websites and mobile apps for their banking transactions exposed critical gaps in our digital identity and authentication methods. Keith Swanson of SAS Institute outlines techniques...
As the United States heads into a holiday weekend, experts are warning that ransomware-wielding attackers are sure to unleash crypto-locking chaos in the coming days, with Conti ransomware attacks in particular having been rising sharply in recent weeks.
Ransomware is the result of a criminal blending technology's wonders: networking and encryption. It's a modern-day implementation of extortion, a crime as old as time. The Atlantic Council contends lessons from fighting past extortion schemes, such as plane hijackings, could help fight ransomware.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the emergence of new and rebranded ransomware groups practicing double extortion and supply chain security challenges in the oil and gas industry.
Ireland's privacy law enforcer, the Data Protection Commission, has hit WhatsApp with a 225 million euro ($266 million) fine, finding that it violated the EU's General Data Protection Regulation in part by not telling users how it was sharing their data with parent company Facebook.
Cryptocurrency exchange Coinbase faces potential user trust challenges after a system error led it to send out false automated security alerts to about 125,000 customers indicating their two-factor authentication settings had been changed.
The operators of LockFile ransomware have adopted new techniques, including "intermittent encryption," to help evade detection, according to cybersecurity firm Sophos.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.