As consumers and organizations demand more stringent identity and access management controls, self-sovereign identity management can play a critical role, says Heather Dahl of the Sovrin Foundation.
New ransomware variants are targeting managed service and cloud service providers: This is one of the predictions made by WatchGuard Technologies for 2020. CTO Corey Nachreiner discusses the top three predictions.
As cloud-first and cloud-native become more common labels in the industry, organizations are focusing on achieving visibility and operational excellence, says Trend Micro's Wendy Moore.
Among the many cybersecurity and privacy risks involving the fast evolving global coronavirus outbreak are potential concerns related to the technology assessments during trial or vaccine research, says cyber risk management in global digital health expert Stanley Mierzwa of Kean University in Union, New Jersey.
Federal government agencies face unique cybersecurity risks, and as a result they often place tight restrictions on mobile devices in the workplace. Michael Campbell of Privoro says it's time to loosen these restrictions because they are negatively impacting missions, recruitment and retention.
The California Consumer Privacy Act, the EU's General Data Protection Regulation and other privacy laws are focused on making enterprises and boards of directors more accountable, says Marc Cohen of ePlus Technology, who discusses compliance issues.
Harvard Kennedy School Professor Juliette Kayyem - well known as a CNN cybersecurity analyst - spoke at RSA 2020 and visited ISMG's studios to share insights on nation-state threats and election security.
Targeted ransomware attacks continue to increase as gangs seek to obtain bigger ransom payoffs by hitting larger targets, aided by a cybercrime services economy that provides access to tools and tactics that were previously the domain of APT groups, security experts warn.
A former acting inspector general of the Department of Homeland Security and another official have been indicted for allegedly stealing DHS proprietary software and databases and then attempting to resell the technology back to the government.
The Department of Health and Human Services Monday released its long-awaited interoperability and information blocking final rules. The aim of the rules is to provide patients with easy, secure access to their electronic health information - from electronic health record systems as well as from payers.
For maximum effectiveness, security-as-a-service solutions can no longer simply be reactive, but must instead be predictive, says Mat Gyde, CEO Security Division, NTT Ltd., and Palo Alto Network's Karl Soderlund, as they describe their companies' new partnership.
Many organizations have leapfrogged from "cloud concerns" to "cloud first" mindsets. What are the implications for encryption and access control in a multi-cloud environment? Lee Waskevich of ePlus and Todd Moore of Thales discuss the challenges and solutions.
There is no more fundamental element in cybersecurity than identity. And in some ways, there's nothing harder to secure. Bil Harmer of SecureAuth calls identity "the last bastion" of cybersecurity, and he's eager to take it on in his new role.
Office365 and SaaS usage are driving a shift away from managing security on premises, necessitating stronger security in the cloud, says Kowsik Guruswamy, CTO at Menlo Security.
Ransomware has evolved in two alarming paths: One to create distraction, the other to ensure destruction. Microsoft's Diana Kelley describes the new trends and how enterprises can respond.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.