It's not the emerging technology or the increasingly complex threat landscape. Instead, people and process are what prove to be consistently the most challenging parts of the job for Caleb Sima, chief security officer at Robinhood.
Please don't pay ransoms, authorities continue to urge. Britain's lead cyber agency and privacy watchdog are now making that appeal directly to legal advisers, warning them that paying a ransom offers no data protection upsides and won't lessen any fine they might face.
Ransomware attackers executing double-extortion schemes very carefully choose which data to steal and leak based on victims' economic sector, says Erick Galinkin, artificial intelligence researcher at security firm Rapid7. He discusses the latest ransomware data theft trends.
The enterprise, workforce, attack surface and threat landscape all have transformed over the past two years. How has the concept of cyber resilience also transformed? Kris Lovejoy of Kyndryl shares insights on resilience maturity and why it's about recovery.
Crema Finance has published its compensation and recovery plans following last week's $8.8 million hack on the Solana blockchain-powered concentrated liquidity protocol. The hacker has returned the stolen funds in exchange for a bounty offered by the company.
A federal grand jury indicted a 38-year-old Florida man for allegedly selling more than $1 billion worth of counterfeit Cisco network equipment to customers worldwide, including hospitals, schools, government agencies and the military, as "new and genuine Cisco products," the indictment says.
The Biden administration continues to react to the Supreme Court's overturn of precedent guaranteeing a constitutional right to abortion, issuing Friday an executive order that includes provisions to help safeguard the privacy of patients' data.
Coalition has secured $250 million on a $5 billion valuation to grow in the United Kingdom and accelerate its executive risk coverage business. The money will allow Coalition to push beyond the United States and Canada into the U.K. by the end of 2022 and cover additional executive risk segments.
Monsoon season in India can result in extreme rainfall but a ransomware attack in the southwestern state of Goa is preventing state authorities from obtaining data from flood monitors located on major rivers. The attack appears to have been made with a variant of Phobos ransomware.
The "deliberate actions" of a now-fired senior engineer at Customer.io put at risk email addresses of six client companies, including NFT marketplace OpenSea. The email delivery vendor did not specify how many individuals are now at elevated risk of phishing attacks.
Four ISMG editors discuss important cybersecurity issues, including the hot topics at ISMG roundtable discussions - such as challenges around software supply chain security, highlights from ISMG's upcoming Healthcare Summit, and how some cybersecurity vendors are creating their own venture funds.
The rapid shift to remote working early in the pandemic and the discovery of serious new flaws such as Log4j have driven criminals to continue probing "what's vulnerable, and how to exploit it," says Casey Ellis, CTO and founder of Bugcrowd. Here's how he recommends organizations respond.
Trellix has just released a new report on cyber war activities in Ukraine. John Fokker discusses the key findings, how this war is reshaping global cybercrime dynamics, and how traditional cybercriminals and nation-state adversaries and blending their activities.
It's been a year since President Biden's executive order that called out zero trust as a primary focus. Richard "Chit" Chitamitre of Corelight discusses the prevalent misunderstandings about zero trust, as well as use cases for how to embrace the framework and make measurable progress along the way.
How can you leverage artificial intelligence and make sense of data from different industries to determine whether a customer is creditworthy or whether an account is a mule account? Guy Sheppard, general manager of financial services at Aboitiz Data Innovation, discusses a case study.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.