To make the transformation to a DevSecOps approach, enterprises must slowly change the corporate culture by finding early adopters and starting small, says Sean D. Mack, CIO and CISO at Wiley, an education and research company.
After a string of high-profile hits, many of the largest and most notorious ransomware operations recently disappeared. But the pace of ransomware attacks hasn't diminished because of a steady influx of new operations, existing operations getting more sophisticated and old players rebranding.
Cloud-based SIEM and SOAR are just two of the new solutions that represent the modernization of security operations. Greg Martin of Sumo Logic discusses how such solutions are helping enterprises overcome legacy technology challenges such as visibility and complexity.
As the lines blur between identity and privilege, there is a growing set of solutions to secure the anytime, anywhere workforce. Archit Lohokare, CyberArk’s vice president of product management, discusses passwordless authentication, zero trust and other ways enterprises are modernizing identity and access.
How can XDR help mitigate ransomware risks? Two experts - Assad Arabi, managing director, gulf cluster region, at Trend Micro, and Andrew Philp, sales leader at the company - offer insights.
Researchers at cybersecurity company Trend Micro have uncovered a new cyberespionage campaign in the Indo-Pacific region by Chinese advanced persistent threat group APT41, also known as Earth Baku.
In the first half of 2021, Fortinet's FortiGuard Labs detected a 10-fold increase in weekly ransomware activity as compared to 2020. This is just one of the trends detailed in the Global Threat Report for the first half of 2021. Derek Manky of FortiGuard Labs analyzes the trends and takeaways.
Although a majority of financial services executives predict that cryptocurrency will replace or rival fiat currency within the next five to 10 years, they say cybersecurity, regulatory and privacy issues are among the biggest obstacles to its adoption, according to a survey by Deloitte.
They are high-profile, they have access to your company's most vital information, they rely on unsecured personal devices - and your cyber adversaries are targeting them. They are your board members, and Chris Pierson of BlackCloak has ideas on where and how you can better secure these leaders.
The Biden administration unveiled a package of supply chain and critical infrastructure security initiatives following a meeting at the White House with tech executives and others. Companies such as Google and Microsoft also promised billions in spending on cybersecurity over the next several years.
As a technology and security leader, Laura-Lea Berna is driven to defend gaps. But as a business executive, the VP, IT and CIO of BC Transit has built her career on answering the question "Where's the need?" She discusses her path and role as a mentor to up-and-coming leaders.
Bitdefender has conducted a forensic analysis of a new backdoor, dubbed Sardonic, used by the threat group Fin8 in recent attacks against two financial organizations.
Security researchers at SonarSource discovered five vulnerabilities that create a critical vulnerability chain in elFinder, an open source web file manager. An updated version of the manager patches the flaws.
Researchers at The Citizen Lab at the University of Toronto say they've found a new zero-click iMessage exploit that's been used by the government of Bahrain to install the NSO Group's Pegasus spyware on the devices of human rights and political activists.
The Biden administration is hosting a White House meeting Wednesday with technology, banking, insurance and education executives to focus on cybersecurity and national security issues, such as protecting critical infrastructure from attacks and how to hire more security professionals to meet demand.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.