Are ransomware-wielding criminals running scared? That's one likely explanation for the sudden release this week of free, master decryption keys for three different strains of formerly prevalent ransomware: Maze, Sekhmet and Egregor.
The security world continues its fight against potential widespread exploitation of the critical remote code execution vulnerability - tracked as CVE-2021-44229 - in Apache's Log4j software library, versions 2.0-beta9 to 2.14.1, known as "Log4Shell" and "Logjam." This is a digest of ISMG's updates.
Organizations today need to rethink how cloud security not only drives stronger predictions, but adds value with ease of use. Learn how you can stop the most evasive attacks automatically with adaptive security.
In the midst of accelerated modernization, increased cybersecurity risks, and the new normal of hybrid work and learning environments, technology leaders in higher education have had to meet enormous challenges. As we enter the new year, what’s on their minds when it comes to issues of cybersecurity, hybrid...
As ransomware threats continue to grow in 2022, cyber insurance companies have clearly stated that they do not want to talk about the "cyber" part of insurance, says Sri Lanka-based Sujit Christy, group CISO at John Keells Holdings PLC.
To build defense capabilities, CISOs need to take a risk-based approach in presenting the highest risk contextually, and they also need to build visibility of tools and controls and a mechanism to prioritize them through a structured program that is communicated in financial terms to the board, says Urooj Burney.
"We came up with a structured, documented approach to respond to mitigating the Log4j vulnerability using the EDR scanning tools along with a code validation, containerization, and sandboxing of our applications and networks," says Ian Keller, security director at Ericsson.
Risk management is essential to the existence of every business. It requires organizations to consider which risks they can accept and which risks they can mitigate. But the problem with risk acceptance is that attackers are "actively looking for risks that you haven't mitigated that they're able to exploit," says...
Kerissa Varma, managing executive for cybersecurity at Vodacom, a South African-based mobile communications company, says simulation is the key to a good incident response plan. She discusses her cybersecurity priorities for 2022.
Third-party risk management is a key priority among businesses today. Risk leaders are being forced to quickly adjust to an evolving risk landscape and a growing number of vendors. As a result, companies need an efficient way to handle their vendor management process.
What are best-in-class organizations doing today...
Third-party risk management is a key priority among businesses today. Risk leaders are being forced to quickly adjust to an evolving risk landscape and a growing number of vendors. As a result, companies need an efficient way to handle their vendor management process.
The 2021 Global Workplace Report reveals that...
The Apache Log4j vulnerability capped the end of a long year for CISOs and incident responders. Security leaders Pooja Shimpi and Deepayan Chanda discuss how they have tackled Log4j - and significant lessons learned about incident response and information sharing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.