CyberEdBoad excutive member Alan Ng of China Taiping Insurance, Singapore, explains the enterprise risk management strategy for the pandemic era and how the Distributed, Immutable and Ephemeral triad works with the Confidentiality, Integrity and Availability triad to make organizations more secure.
Zero Trust deployment - the acts of moving apps and data to the cloud and assuming no user or device is trustworthy until proven otherwise - came into vogue in response to COVID-19. A lot has changed since Zero Trust first appeared in 2014, so our concept of Zero Trust must also evolve. Stephen Banda of Lookout...
The rise of 5G for business is accompanied by anticipation, but also anxiety. Will the expanded footprint of IoT create an unwieldy attack surface? Will the latency benefits of edge computing be worth creating a potential new strike vector? Don’t believe everything you read in the tech headlines.
In our next...
Zero Trust is not simply a different type of security technology or architecture; it is a methodology that provides a more comprehensive, dynamic and integrated approach to security. Cloud computing and software defined approaches along with maturity and interoperability across the technology ecosystem means Zero...
Ransomware is now a board level discussion and continues to challenge every organization today. Ransomware attackers compromise applications and data to extort payment from victims. The best defense from ransomware is trustworthy backups. Unfortunately, attackers often compromise the path to recovery by deleting and...
ISMG editors discuss: U.S. Sen. Angus King on the need for the federal government to form a clear, declarative cyber deterrence strategy, how CISA is ramping up efforts to support critical infrastructure defenses and the potential implications of the U.S. blacklisting of Israeli spyware firms.
The latest edition of the ISMG Security Report features insight from U.S. Sen. Angus King on why the federal government needs to declare a clear response to cybercriminals in order to deter them. Also featured: Ransomware affiliates gain power and promoting diversity of thought in cybersecurity.
Cyber attacks, ransomware, identity-based security, and digital transformation are hot topics for information security teams today. The financial services industry (like many others) has had to aggressively pivot in the last year as workforces and business practices accelerated their adoption of digital services. ...
In ransomware attacks, cybercriminals attack through the backups because they know that security practitioners rely on backups to save themselves after a ransomware attack. Therefore, it is essential to have multiple backups, says Tom Kellermann, head of cybersecurity strategy at VMware.
Findings from CyberTheory's 2021 Third Quarter Review indicate that criminals are exploiting the open-source supply chain, and those exploits are proving much more difficult to identify, defend and stop in terms of complexity and depth than we've seen before, says CyberTheory's director, Steve King.
How many ways do U.S. businesses need to be told to lock down their systems to safeguard themselves from ransomware? That's the focus of a new, joint cybersecurity advisory from the U.S. government pertaining to BlackMatter, following an advisory issued last month about Conti.
Managing the balance between business innovation and operational needs, with enhanced cybersecurity risk management is creating a global ‘talent crunch.’ The scarcity of highly skilled cybersecurity resources, along with organizations looking to leverage Zero Trust, implement least privilege and just-in-time...
Organizations often grant overly permissive privileges to users and services that are often unused. This level of access exposes you, enabling adversaries to hack into the cloud and perform malicious activity. Deep visibility across all cloud entitlements and permissions, as well as a Zero Trust approach to managing...
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the importance of product security, the impact of ransomware on healthcare sector entities during the pandemic and thinking about cybersecurity awareness creatively.
Some of the highest-ranking cybersecurity officials in the U.S. government discussed the pervasive threat of ransomware on Tuesday, likening it to a clear issue of national security with the ability to inflict measurable damage on major world powers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.