Some experts predict cyber insurance rates will increase 40-75% in the near future, and MSPs need to take action now to protect their profits and businesses in 2022 and beyond. The panelists will explore why ransomware attacks are at the heart of these increases. This webinar features expert insights from:
Fortinet has raised prices on products and services to address macroeconomic challenges including shipping delays, longer activation timelines and the suspension of sales in Russia. The company says price hikes have more than offset supply chain and geopolitical headwinds in recent months.
John Kindervag, creator of zero trust and senior vice president at ON2IT, and Grant Schneider, senior director at Venable, join ISMG editors to discuss the latest Log 4j findings, threats posed by a Chinese-made automotive GPS tracker and the challenges of a distributed workforce.
With its acquisition of Infiot, Netskope now carries both the networking and security technology needed to build a Secure Access Service Edge architecture following. The acquisition of Infiot's platform will allow Netskope customers to address both traditional and emerging SD-WAN use cases.
Organisations are facing sophisticated and well-funded adversaries with targeted penetration strategies, including supply chain attacks. Despite multi-layered security investments, these threat actors are successfully breaching defenses and going after organisations’ data. That’s why data security is your last –...
An In-Depth Look into Four Recent Ecommerce Trends Shaking up the Industry
The State of Commerce Report offers a comprehensive look at emerging post-pandemic retail trends and tips for ecommerce leaders looking to uplevel their commerce strategies.
The report outlines how retailers can:
As a federal agency that collects, processes and stores massive quantities of data - including sensitive information - keeping your data safe is critical. Ensuring that your IT infrastructure has end-to-end protective measures in place sets the foundation for cyber protection and resiliency in the event of an...
Microsoft is revealing details of an advanced spyware campaign in a bid to neutralize its effectiveness. It fingers Austrian firm DSIRF as responsible for coding malware known as "Subzero," which Microsoft researchers dub "Knotweed." Pressure is mounting on companies that supply spyware apps.
This case study presents an organization that transformed its global business operations to deliver “digital everything” for its workforce and customers.
The AVP of Security Operations said: “as we move into a ‘digital everything’ world, protecting our customers and employees is the top priority. We’re...
The chairman of the U.S. House Intelligence Committee vowed more action against makers of advance spyware such as Israel's NSO Group while witnesses pressed the panel to commit the intelligence community's resources to disrupting spyware companies.
Human and PerimeterX will join forces to prevent fraud and account abuse and address a broader range of use cases. The combination will create a bot mitigation monster with 450 employees, more than $100 million in annual recurring revenue and more than 500 customers across media and e-commerce.
While reports of big health data compromises involving unencrypted computers have been sinking for years, the recent theft of an iPad from a locked storage room - along with the tablet's password - is a reminder that mobile device mishaps can lead to breaches affecting tens of thousands of patients.
In this era of Digital Transformation as our reliance on digital systems and technology increases, we see that it’s only cyberattacks that have broken away from this dependency and are exceeding in terms of both scale and severity.
Organizations, thought leaders and C-Suite officials are struggling to keep up...
Security researchers identified a rootkit active as recently as 2020 that's made to burrow deep into computers when firmware initiates the operating system. Infected motherboards examined by Kaspersky all ran on Intel's H81 chipset. The malware comes from an unknown Chinese-speaking threat actor.
Exploring new ways to offer security as a service from his organization to external customers is an exciting challenge and opportunity, says Sean Mack, CIO and CISO of publishing company Wiley. He also discusses aligning security investments with the company's biggest business risks and goals.