Okta says it should have notified customers of a breach earlier and that Lapsus$ compromised a laptop belonging to Sitel, a third-party customer support firm, via remote desktop protocol, enabling it to infiltrate Okta's network. Cybersecurity experts discuss the impact of the breach and offer mitigation advice.
A Texas dental and orthodontic practice that boasts of being "the official dentist" of the National Basketball Association team the Dallas Mavericks is notifying more than 1 million individuals of a 2021 breach involving patient information being viewed and copied by attackers.
If Russia uses hack attacks to support its invasion, would Western governments want to immediately attribute those attacks or disruptions? Enter a Thursday alert from the U.S. government warning that it is "aware of possible threats to U.S. and international satellite communication networks."
Sri Lanka-based Sujit Christy, group CISO at John Keells Holdings PLC, says his passion is empowering security practitioners with the right skills and knowledge and ensuring they speak the right language. He discusses cybersecurity adoption and enablement.
Healthcare sector entities increasingly need to implement a zero trust approach with their security, says federal adviser Erik Decker, CISO of Intermountain Healthcare. Zero trust, he says, integrates "a lot of different architecture and systems … that have to work in concert with each other."
An Alabama clinic and an Indiana-based orthopedic practice have each reported hacking incidents discovered last fall that affected the information of more than 310,000 individuals in total. Both entities list various measures they are taking to bolster security in the wake of those incidents.
Building an effective vulnerability management program requires assessing your inventory to identify the critical, vulnerable, external- and internal-facing applications and applying internal controls to secure them, says John Sandiford, principal security architect at Verizon.
Where are you to likely gain insights from security experts on how SASE can help you achieve better visibility into IT systems, secure your unmanaged applications and devices and consolidate your investments as you move to a remote workforce environment? The answer is SASE Day.
CISOs appreciate the SASE approach, which allows them to incorporate all their existing investments - often made in a phased manner - to undergo the digital transformation, says Sid Deshpande, field CTO at Palo Alto Networks. He discusses how SASE can solve CISOs' problems.
On this week's "Sound Off," we ask John Kindervag, the founder of Zero Trust, for his reaction to the recently released Office of Management and Budget federal strategy to move the U.S. government toward a mature Zero Trust architecture.
Facial recognition as a tool is not bad, but the manner in which it is used can make it look bad, says Brett Johnson, a consultant on cybersecurity, cybercrime and ID theft who was a central figure in the cybercrime world for over 20 years.
The ransomware operation known as Alphv - aka BlackCat - appears to be a reboot of the DarkSide group, which rebranded as BlackMatter following serious encryption and victim-selection mistakes. Amid reports that Alphv has disrupted 17 oil terminals in Western Europe, how long until the next rebrand?
ThycoticCentrify renames itself Delinea to grow as a "seamless" security solution. Other acquisitions focus on providing tools to developers to better secure applications and software, boost healthcare device security, fight against chargeback fraud and bring smaller organizations into compliance.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.