Control is the lifeblood of an effective information security program, but fully locking down endpoints is impossible, not least in the open environment of a public university, says Robert Hellwig, CISO of Germany's University of Siegen. In this exclusive discussion, he recommends approaches.
Greek postal service Hellenic Post says a ransomware incident has forced it to pull a majority of its operations offline. It is working with IT security experts to probe the attack and restore services. Its subsidiary ELTA Courier has taken over nearly all operations to maintain business continuity.
In the concluding conversation between Geetha Nandikotkur, managing editor and conference chair, Asia & Middle East, ISMG, and Siddharth Deshpande, field CTO, Palo Alto Networks, on SASE Day 2022, the two discuss some key takeaways and actionable steps toward effective SASE adoption.
Just one day after the White House warned that intelligence is pointing to potential offensive cyberattacks out of Moscow, European Union officials are calling for more stringent cybersecurity rules.
Yet another ransomware-wielding group of criminals has hit an organization in the health sector. This time, it's cybercrime group RansomEXX, which has been trumpeting an attack against the Scottish Association for Mental Health. The crime gang says it has stolen more than 12GB of data from SAMH.
Identity management company Okta and Microsoft have confirmed breaches by the Lapsus$ group, which has been on a high-profile hacking spree. Okta is facing increasing pressure to more fully describe the impact of its incident, as Okta's identity systems are widely used across enterprises.
(ISC)² released results of an online poll about the Log4j vulnerability and the human impact of the efforts to remediate it. CISO Jon France shares findings from the survey, revealing the severity and long-term consequences of the Log4j attack for security teams and the organizations they protect.
Prospects of Russia reviving its economy via cryptocurrency remain limited, officials have said, but the U.S. Treasury Department is reportedly warning that it has detected a rise in the use of digital assets for illicit transactions, including after Feb. 24, when the war began.
The Department of Health and Human Services has an ambitious regulatory agenda in the months ahead and plans for strong enforcement of HIPAA violations, says Lisa Pino, director of the HHS Office for Civil Rights, in an exclusive interview. She also discusses evolving breach trends.
In the coming weeks, U.S. President Joe Biden will announce a new executive order to prevent and detect identity theft involving public benefits. Jeremy Grant, coordinator of the Better Identity Coalition, discusses the challenges ahead for the government in combating criminal and identity fraud.
The ransomware-as-a-service operation AvosLocker has been amassing "victims across multiple critical infrastructure sectors in the United States," the FBI warns in a new alert that includes known indicators of compromise and tactics employed the group and essential defenses for all organizations.
A Texas dental and orthodontic practice that boasts of being "the official dentist" of the National Basketball Association team the Dallas Mavericks is notifying more than 1 million individuals of a 2021 breach involving patient information being viewed and copied by attackers.
The U.S. National Rifle Association States reportedly fell victim to a ransomware attack in October 2021. The NRA did not acknowledge the attack at the time, but a recent FEC filing explaining a financial discrepancy has forced it to confirm the ransomware attack and detail its impact.
The toll of a ransomware attack goes far beyond the price of the actual ransom. Ajay Bhatia of Veritas and Jose Thomas of Microsoft share the potential costs and gaps enterprises face when it comes to being able to detect, defend and recover from ransomware attacks.
Researchers have uncovered a full-time initial access broker group that serves both Conti and Diavol ransomware groups. Google's Threat Analysis Group - TAG - observed this financially motivated threat actor, dubbed Exotic Lily, exploiting a zero-day in Microsoft MSHTML tracked as CVE-2021-40444.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.