Complex IT ecosystems coupled with fragile security protocols leave companies vulnerable to security attacks. As companies move towards Zero Trust, microsegmentation solutions help protect against unknown exposures on the network. Organizations are continuously responding to changes in the cybersecurity landscape and...
ThycoticCentrify renames itself Delinea to grow as a "seamless" security solution. Other acquisitions focus on providing tools to developers to better secure applications and software, boost healthcare device security, fight against chargeback fraud and bring smaller organizations into compliance.
Four ISMG editors discuss important cybersecurity issues, including misconceptions around Zero Trust implementation, lessons learned from the crippling NotPetya malware attack of 2017 that nearly sank logistics giant Maersk and how a Russian cyberwar in Ukraine could move beyond its borders.
Pharmaceutical giant Pfizer alleges in a federal lawsuit that two former executives stole documents containing trade secrets about diabetes, obesity and cancer treatments under development by the drugmaker to benefit two new biotech startups they had launched.
In 2022, CISOs need to build an adaptive and cyber-resilient enterprise through hyperautomation in order to implement any kind of cybersecurity controls, says Vishal Salvi, CISO and head of the cybersecurity practice at Infosys.
Change is afoot at Trellix, which is the new name of the cybersecurity software business formed from the merger of McAfee Enterprise and FireEye. CEO Bryan Palma says the extended detection and response - aka XDR - software imperative for his customers is to do more, but with fewer suppliers and management overhead.
Israeli spyware company NSO's flagship product, Pegasus, was tested by the FBI, according to reports, prior to the company being sanctioned by the U.S in the wake of revelations of misuse of its tools. Now, U.S. venture capital company Integrity Partners is in negotiation to take control of the company.
A newly discovered ransomware, Deadbolt, affected Taiwanese network-attached storage provider QNAP Systems and encrypted user data. The threat group demands 0.03 bitcoin for the decryption code. And an automatic forced update rolled out by QNAP caused more harm than good, according to some users.
As ransomware threats continue to grow in 2022, cyber insurance companies have clearly stated that they do not want to talk about the "cyber" part of insurance, says Sri Lanka-based Sujit Christy, group CISO at John Keells Holdings PLC.
Kyle Flaherty has worked with a range of companies, changing the worlds of big data, IoT, BYOD, SaaS, open-source software, network security, fraud detection, data analytics, marketing automation and network management. He weighs in on brands and how metrics feed different audiences.
Maersk was one of dozens of organizations crippled by the NotPetya malware in June 2017. Gavin Ashton and Bharat Halai worked in identity and access management at Maersk and share how the company's technology team tirelessly brought the company back from the brink of an IT systems meltdown.
Has the notorious REvil, aka Sodinokibi, ransomware operation rebooted as "Ransom Cartel"? Security experts say the new group has technical and other crossovers with REvil. But whether the new group is a spinoff of REvil, bought the tools, or is simply copying how they work, remains unclear.
It seems that every day we hear something about XDR along the benefits users are finding after deploying this technology. When investigating these solutions, MSSPs are finding that there are three different approaches vendors are taking to implement their XDR platforms – Native XDR, Open XDR and Hybrid XDR....
Join Cynet’s Director of Marketing, George Tubin, and ISMG’s Senior Vice President of Editorial, Tom Field, for an in-depth discussion on the value of MSSPs, and what you can expect from XDR technology today.
In this fireside chat, our thought leaders cover the benefits and drawbacks of the three dominating XDR...
Today’s world of work is difficult to define. Where and how work happens has fundamentally changed, and permanent hybrid working will inevitably strain an organization’s ability to detect cyber threats, especially as the trusted perimeter stretches to include remote workers.
The 2021 Global Workplace Report...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.