In today's dynamic threat environment, security teams must adopt a risk-based approach, prioritizing the most important areas of their organization. They also should not be afraid to seek outside help. Murtaza Hafizji of Bugcrowd discusses the merits of crowdsourced security.
How has the role of a CISO evolved over the years, and what are some of the areas in which it has changed? Sapan Talwar, global CISO at a manufacturing firm, shares his journey and talks about the technologies that he is passionate about.
It's been over one year since the release of President Biden's cybersecurity executive order, and federal agencies are making measurable progress in adopting zero trust architecture. Dennis Reilly of Gigamon discusses specific progress around visibility and observability in the network pillar.
California's largest public school district and the second-largest in the U.S. is undergoing a ransomware attack. The attack has disrupted the district's email system but fundamental school system functions - including instruction and transportation, food and after-school programs - are unaffected.
The operators behind banking Trojan SharkBot are distributing an updated version of the malware on now-deactivated malicious applications on Google Play. Called Mister Phone Cleaner and Kylhavy Mobile Security, the apps have been downloaded 10,000 and 50,000 times, respectively, says Fox-IT.
In the latest "Proof of Concept," experts join ISMG editors to discuss concerns over Twitter's security leading up to the U.S. midterm elections, the move by the U.S. Department of Justice to file its most sensitive court documents on paper, and the recent sanctions against Tornado Cash.
Why is business identity theft increasing, and what are the latest tactics fraudsters are using to scam businesses and gig workers? Eva Velasquez, CEO at the Identity Theft Resource Center, shares her views on how business identity theft has evolved over the years and how to prevent it.
One of the biggest challenges for cybercriminals is how to defeat multifactor authentication. New research has uncovered a criminal service called "EvilProxy" that uses a technique called session hijacking to steal session cookies to bypass MFA and compromise accounts.
Post-pandemic, in the new era of hybrid work, Mastercard CSO Ron Green says the unintentional insider threat is one of his top concerns for member institutions and their customers. He shares insight on threats, partnerships and how the public and private sectors can address workforce development.
HelpSystems acquired Dutch red-teaming startup Outflank to help critical infrastructure firms more effectively prepare for cyberattacks. The buying of Outflank will provide clients with a broader range of red-teaming software and services thanks to Outflank's tight integration with Cobalt Strike.
The NFL's San Francisco 49ers will notify more than 20,000 Americans that online attackers likely stole their name and Social Security number from the sports franchise's corporate network in a February network security incident. Ransomware-as-a-service group BlackByte took credit for the attack.
Chile's national consumer protection agency was hit by a ransomware attack affecting online services and containing indicators connecting the malware with the Conti ransomware-as-a-service group. A government official says national policy is not to pay ransoms.
Insurance market giant Lloyd's of London says that starting next year, its cyber insurance policies will no longer cover state-sponsored cyberattacks. But with attribution being inherently tricky, expect this move to be tested in court, says Jonathan Armstrong, a partner at Cordery law firm.
Would you trust an accused hacker? Specifically, one Nickolas Sharp, a software developer charged with extorting former employer Ubiquiti, after allegedly engineering a data breach and posing as an anonymous whistleblower in media interviews.
Enterprises just starting their cloud journey should take a zero trust approach in everything they do, says Ajay Kumar Dubey, channel partner with Forcepoint. Zero trust should secure content, access, data and user activities, and above all, it should be "foolproof and simple to use," he advises.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.