Assets kept behind air-gapped networks should be inaccessible, but researchers from Pentera describe how hackers use the DNS protocol as a command-and-control channel. To be truly safe, companies should isolate the DNS server used for air-gapped networks and filter traffic for anomalies.
The security industry has traditionally tried to protect sensitive data by putting control points on endpoints or networks, but Skyhigh Security has taken a different approach. The company applies consistent policies around how data is treated across its ZTNA, SWG and CASB offerings.
Banks using behavioral-based controls are detecting malicious accounts in 92% of cases before traditional AML and transaction monitoring systems alert the bank.
Updated guidance from the Federal Trade Commission and the Department of Health and Human Services aims to help clarify for mobile health app developers creating apps that process health data the privacy and security regulations that apply to their products.
Australian telecommunications provider Telstra apologized for accidentally publishing names, numbers and addresses of over 130,000 customers whose details were supposed to be unlisted. The company apologized for the error and blamed a "misalignment of databases."
Australian Home Affairs and Cyber Security Minister Clare O'Neil vowed during a speech to transform the country into the world's most cyber-secure, saying experts will start work on a strategy intended to outdo the rest of the world by 2030. The country has recently experienced a data breach wave.
The purchase of healthcare security startup Medigate means Claroty can address the IoT, OT, IoMT and connected device needs of hospitals from a single platform. Claroty says its single-platform approach facilitates everything from network mapping and segmentation to continuous threat detection.
An important element of cybersecurity maturity is defining what exactly an organization is trying to accomplish, says Dan Wilkins, CISO for the state of Arizona. With that mission in mind, security teams can align strategy, goals and benchmarks for cyber maturity.
The Health Sector Coordinating Council is embarking on a five-year strategic plan to help the healthcare and public health sector address future cybersecurity threats, risks and associated difficulties, says Greg Garcia, executive director for cybersecurity at HSCC.
As the potential harm posed by technology increases, the cybersecurity stakes are changing, warned speakers at Black Hat Europe. With governments taking a greater interest in regulating cybersecurity - and perhaps practitioners - experts urged practitioners to collectively guide their own destiny.
Data management, supply chain assurance and regulatory evolution are among the topics touched upon in this look at the year ahead with Troy Leach, chief strategy officer of the Cloud Security Alliance. Find out what trends Leach is watching and the predictions he makes for 2023.
Permira's $5.8 billion acquisition of Mimecast has allowed the email security vendor to make product and technology investments that don't provide an immediate financial return. Several buyers expressed interest in taking Mimecast private, and CEO Peter Bauer is glad the firm ended up with Permira.
Asset management historically either looked at network traffic or attempted to put an agent on everything, which Axonius CEO Dean Sysman says left organizations drowning in data. Axonius focuses solely on bringing data together from a customer's existing infrastructure and controls.
As a former Division 1 athlete and coach, security leader Ty Howard learned that "repetition" and "being relentless" are keys to success and were invaluable lessons for his career as a CISO. He shares how camaraderie and professional growth help inspire his team and collaboration with the IT group.
The U.K. Department for Environment, Food and Rural Affairs relies heavily on applications no longer supported by their vendor. Current levels of modernization spending are not sufficient to "reduce cybersecurity and resilience risks to an acceptable level," warns the National Audit Office.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.