MeitY is requiring every government department in India to appoint a senior staff member as CISO. But some security experts question whether there are enough qualified security experts in all government departments to fill the new CISO positions and suggest departments consider hiring outside experts.
Target has reached a record settlement agreement with 47 states' attorneys general over its 2013 data breach. The breach resulted in hackers compromising 41 million customers' payment card details and contact details for more than 60 million customers being exposed.
A RedSeal-72Point study of 200 CEOs about their perceptions of cybersecurity posture discovered that many are dangerously unrealistic about how vulnerable they are. In fact, more than 80 percent displayed "cyber naiveté," allowing their organizations to be exposed to cyber-attack.
This study reveals the...
As ransomware attackers continue to hone their craft, defense also is evolving. Con Mallon of CrowdStrike discusses what to do - and what not to do - when your organization is struck by ransomware.
"Do nothing doesn't work," says Mallon, the Senior Director of Product Marketing at CrowdStrike. "We have to come up...
In a rare acknowledgment of a data breach by an Indian company, online restaurant guide and food ordering service Zomata says 17 million users' email addresses and hashed passwords were stolen from its database. The company was hacked by a white-hat hacker back in 2015.
Not so many years ago, Michael Donaldson was managing a major application for a large enterprise, and when he learned of an unpatched vulnerability, it took him two days to investigate and confirm. With the right tools today, that would take two hours. Read and learn how.
Donaldson, now a Solutions Architect with...
Criminals have long aimed to separate people from their possessions. So for anyone who follows ransomware, the WannaCry outbreak won't come as a shock. Nor will longstanding advice for surviving ransomware shakedowns: Prepare, or prepare to pay.
New cybersecurity requirements for organizations regulated by the New York State Department of Financial Services (NYDFS) went into effect March 1, 2017. The new regulation will be felt far beyond the state of New York and will likely become the baseline standard for the financial services industry.
Who in the world could have attempted to mess with this past weekend's presidential election in France via a well-timed dump of campaign documents and communications from the campaign of Emmanuel Macron? Security experts say all evidence points to the usual suspect: Russian hackers.
Not so many years ago, Michael Donaldson was managing a major application for a large enterprise, and when he learned of an unpatched vulnerability, it took him two days to investigate and confirm. With the right tools today, that would take two hours. Listen and learn how.
In order to fully understand the impact of a breach, the detection of malware threats needs to be complemented by the proactive exploration of anomalous network behavior and inter-artifact relationships. This activity is supported by machine learning techniques, which can be leveraged to aggregate and classify events...
While the federal health data breach tally shows that hacker incidents continue to rise in 2017, regulators are offering up some insights from their investigations into a handful of ransomware-related breaches reported in 2016.
The latest draft version of the Trump administration's cybersecurity executive order is similar to the previous version and lays out a plan to secure U.S. federal government and critical infrastructure IT that could have come out of the Obama White House.
As an assistant U.S. attorney in northern Georgia, Nathan Kitchens has seen scores of cybercrime cases - especially ransomware attacks and business email compromises. And he has two words of advice to potential victims: Be prepared.