The ISMG Security Report features an analysis of the U.S. government's request for billions of dollars in tech aid to curb the global impact of the Kremlin's campaign in Ukraine. It also examines Biden's cryptocurrency executive order and why breached organizations often don't share full details.
Former top U.S. cybersecurity official Richard Clarke said on Wednesday that the conflict in Ukraine will likely worsen before showing signs of improvement, including potential cyber escalation with the U.S. and its NATO allies. He urged U.S. organizations to allocate resources to cyber defense.
An Alabama clinic and an Indiana-based orthopedic practice have each reported hacking incidents discovered last fall that affected the information of more than 310,000 individuals in total. Both entities list various measures they are taking to bolster security in the wake of those incidents.
The Lapsus$ ransomware group is tricking users into installing malware by disguising it as verified and signed certificates, which researchers say are believed to have been stolen from the Nvidia and Samsung source code leaks.
As expected, President Joe Biden on Wednesday signed an executive order on cryptocurrency that tackles consumer protection, financial stability, national security and climate risks. The administration calls it the first whole-of-government strategy to rein in cryptocurrencies.
In an excerpt from his book "CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide," Peter Gregory discusses choosing the fifth option in risk management, which is ignoring the risk. He warns of the problems that choice can cause.
President Joe Biden is expected to outline a whole-of-government approach to reining in cryptocurrencies, which have been criticized for lax cybersecurity measures. Media reports say the administration will announce an executive order on crypto this week, to align the U.S. with global allies.
Federal authorities are warning about seven vulnerabilities affecting a software agent used to remotely manage an array of medical devices and other connected gear. If exploited, the vulnerabilities could enable hackers to gain full control of the affected devices or alter their configurations.
Ransomware groups continue to target critical infrastructure sectors internationally. An FBI alert says that ransomware group RagnarLocker has targeted 52 entities across 10 critical infrastructure sectors, while Romania's premier petrol supplier, Rompetrol, has reportedly been hit by Hive.
With the pace and scale of recent attacks - Log4j is a prime example - organizations are strained to detect and respond before damage is done. Enter modern MDR and the strategic role it can play. Dustin Hutchison of Pondurance explains why MDR is now mission-critical.
Double-extortion ransomware. Supply chain attacks. Weaponized zero-days. It's an advanced threat landscape, and it requires advanced defenses. Taylor Ettema of Palo Alto Networks outlines the key capabilities today's security solutions require to step up against the adversaries' ongoing innovation.
Google will buy cybersecurity firm Mandiant for $5.4 billion, an acquisition Google says will give it new capabilities to respond to cybersecurity threats and bolster its cloud platform. Mandiant will be folded into Google's Cloud Platform.
As Western cybersecurity officials warn that Russia's Ukraine invasion poses an elevated cybersecurity risk to all, kudos to Cloudflare, CrowdStrike and Ping Identity for offering free endpoint security and other defenses to the healthcare sector and power sectors, for at least four months.
U.S. and NATO officials are increasingly looking to sharpen sanctions and rhetoric against Russia, and cybersecurity is a pivotal part of the discussion. The Biden administration is now requesting $10 billion in emergency funds to address Russia's campaign, with sizeable pots for cybersecurity.
A new federal report spotlighting the spate of recent cyberattacks on the healthcare and other sector provides insights to help organizations better navigate continuing and evolving cybersecurity trends and challenges in 2022 and beyond.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.