As the massive ESXiArgs ransomware campaign continues to target unpatched VMware ESXi hypervisors, cybersecurity experts have released a script that can decrypt at least some affected virtual machines. Ransomware trackers count at least 2,803 victims, primarily in France, the U.S. and Germany.
APIs represent the best and worst of times - "massive amounts of business value, but massive amounts of unmitigated risk," says Richard Bird, CSO, Traceable AI. In the past year, misconfigured or error-prone APIs resulted in high-profile breaches at Twitter and T-Mobile. He sees more on the horizon.
Organizations have struggled to understand why APIs are so strategic even though they're an intrinsic way businesses interface with their software, according to Checkmarx CEO Emmanuel Benzaquen. He says API abuse is slated to become one of the most common types of web application data breaches.
Today’s enterprises are facing tremendous pressure to modernize so they can unlock their capacity for better, more profitable customer experiences.
They’re being challenged to adapt their foundational revenue-generating, client-facing business processes to fully seize the potential of the moment. With the...
U.S. federal authorities are establishing a new office to tackle supply chain security issues and help industry partners put federal guidance and policies into practice. Former GSA administrator Shon Lyublanovits says she is spearheading the launch of the new organization.
The nearly $200 million it raised in December will allow Snyk to consolidate the developer security market through organic investment and M&A, says CEO Peter McKay. Snyk has focused on bringing open-source security, container security, infrastructure- as-code security and cloud security together.
Passwords are a major security flaw, yet still remain a staple of most enterprises. KuppingerCole Analysts provide insight on going passwordless for your Zero Trust initiatives.
Read “A Passwordless Future Begins with Credential Management” for insight on:
Improving your organization's security posture...
Organizations must grapple with software development happening at a faster pace than ever as well as an exponential increase in attacks on the software layer. Contrast Security has therefore developed new technology to secure code that's deployed quickly to the cloud, CEO Alan Naumann says.
When a client’s server goes down or is compromised in a cyberattack, managed service providers (MSPs) need an effective business continuity and disaster recovery (BCDR) solution to restore data and operations quickly, without sacrificing margin.
Download this eBook to learn about:
Common BCDR myths and...
77% of SMBs believe their IT environments have become more complex over the past two years, and 52% of SMBs believe that this complexity is driving a rapid change in the cybersecurity landscape.
Download this eBook to learn about:
A multifaceted approach to building a secure RMM;
Enabling MSPs to secure...
Seattle police have charged an online retailer's "shopping experience" software programmer with engineering a fraud scheme based on the movie "Office Space," in which malicious software was used to transfer a fraction of every transaction into an outside account.
The software risk landscape has changed – and not for the better. Malicious actors constantly evolve their tactics, techniques, and procedures (TTPs) to find new ways of infiltrating or disrupting organizations, and the software supply chain is now firmly in the crosshairs. A surge of sophisticated and diverse...
With APIs, those challenges include, first and foremost, security risks. The more APIs you use, and the more complex your API architectures, the harder you’ll need to work to ensure that security issues with APIs don’t undercut the value that APIs bring to your applications and infrastructure.
This whitepaper...
In the latest update, four ISMG editors discuss important issues of 2022, including: CISO Marene Allison's unique career path; Ukrainian government cybersecurity official Victor Zhora on lessons learned from countering cyberattacks; and insights from CEO Nikesh Arora of Palo Alto Networks.
Phishing and other socially-engineered schemes are going to get bolder, the attack surface is only going to get bigger, and enterprises everywhere are going to have to focus more on building cyber resilience. These are among the New Year's predictions from Zoom's new CISO, Michael Adams.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.