Security's Associate Editor Maria Henriquez analyzes the top data breaches of 2022 and their effects on enterprise cybersecurity and national legislation going forward.
from Cybersecurity News https://ift.tt/0kaWiz4
Live Player 3.2 extension and toolbar is a corrupt browser application that ruins Firefox, Google Chrome and Internet explorer, etc. The Live Player 3.2 virus comes as a free TV channel player which offers its user watch various international TV shows and programs without paying anything. But soon after this program has been installed, you,ll
Security's Associate Editor Maria Henriquez analyzes the top data breaches of 2022 and their effects on enterprise cybersecurity and national legislation going forward.
Being alert and anticipative – conducting regular cybersecurity drills, for example – is as essential as prioritization, cyber-resilience and adaptiveness in improving the security mindset of an organization.
Manufacturing phases that run on off-site cloud servers come with added security concerns.
The cybersecurity skills gap creates real security challenges for enterprises. Training employees to recognize security risks can increase business resilience.
What are the biggest cybersecurity risk factors for healthcare heading into 2023?
In Episode 13 of the Cybersecurity and Geopolitical Podcast series, hosts Ian Thornton-Trump and Philip Ingram discuss the geopolitical threat landscape involving Russia, China, Iran and North Korea.
Creating cybersecurity assessment reports and awareness programs can help organizations mitigate the risk of data breaches and build a positive reputation.
As you build your cybersecurity resilience planning, priorities and roadmap for the year ahead, security leaders offer cybersecurity predictions for 2023.
Here are 5 key priorities that organizations must build into their cybersecurity plans for 2023.
Small and medium-sized businesses should look to build a SOC that meets their needs at a price point that fits within their overall security expenditures.
With this much economic uncertainty, now is the time to invest in making your third-party risk management (TPRM) program recession-proof in 2023.
The public and private sectors, and the security industry as a whole, need to come together to get healthcare security on the road to recovery.
Get a special look at Security magazine's top 10 data breaches of 2022 annual report.
As external stakeholders demand more information and insight into your organization’s security practices and protocols, implementing a comprehensive security communications strategy is a must.
Why does the cybersecurity workforce gap exist? How can organizations best mitigate it?
Security magazine sits down with Dan Amiga, Chief Technology Officer (CTO) of Island, to discuss how to find a balance between providing end user privacy and protecting company data.
Every organization needs to rethink its approach to security, governance, privacy and compliance by prioritizing the management and protection of data.
How can unified Identity Orchestration (IO) technology effectively tie different systems together for a seamless, proactive threat identification approach?
Security magazine highlights ten of the top physical security & cybersecurity news stories from 2022, ranging from emergency response to metaverse cyber threats.
When a cloud-native security tool is in place — one that understands identity, context, and risk — organizations are truly protected from both inbound email threats and email platform attacks.
What are some of the leading cyber risks and cybersecurity trends in 2022?
In this episode of The Security Podcasts, the Security magazine editorial team sits down to reflect on interesting, engaging and diverse stories from the security industry in 2022.
In the midst of conversations about securing the software supply chain, one term consistently rises to the forefront: SBOM.
What are six operational technology (OT) cybersecurity trends to watch in 2023?
Get a special look at Security magazine's top 12 articles of 2022 — all of which cover thought leadership around physical security, cybersecurity, risk management & more.
What are the four major cybersecurity capabilities endpoint detection and response (EDR) solutions provide?
True DevSecOps requires shifting both left and right, testing in both staging and production environments continuously in real-time.
In a world where successful exploits may be inevitable, relying on a perimeter WAF for application security leaves entire environments vulnerable unless adequate security tools and policies are implemented.
Cybersecurity budget management is crucial in increasing a company’s cybersecurity efficiency and eliminating security blind spots.
Business continuity, security awareness, visibility and patch management are four strategies for cybersecurity leaders to protect their organizations against ransomware.
In this The Security Podcasts episode, Kevin A. McGrail, Cloud Fellow at Dito, talks the importance of cybersecurity awareness and a communicative organizational culture.
What can K-12 school systems and higher education institutions do to implement a zero trust environment to boost cybersecurity defenses?
Closing the cybersecurity skills gap requires a two-pronged approach to cyber best practices and education, leveraging the cloud and automation.
To guard against cybercrime, it’s critical to monitor and assess every secret window into your organization’s operations. For most, these gateways are in the supply chain among third parties.
Here are the top ways hackers use psychological warfare to find their targets and successfully coerce them into meeting their ransom demands.
Every hack on critical infrastructure is a good reason to bolster cyber resilience: a cybersecurity objective best achieved by foregrounding industry knowledge.
Boards have a fiduciary responsibility in their governance capacity to set the tone with their vigilance and demonstrate the criticality of cybersecurity risk management.
Teresa Shea, a renowned defense, intelligence and cybersecurity expert has joined the Board of Directors at Cigent Technology, Inc.
Learn about six strategies to prevent cybersecurity threats and reduce data breaches.
Iranian government-sponsored advanced persistent threat (APT) actors breached the Federal Civilian Executive Branch (FCEB) and its network, according to CISA.
Breaking down silos isn’t just a matter of improving collaboration and innovation; it’s critical to enhancing fraud prevention efforts.
As organizational cybersecurity leaders seek to protect their institutions from cyber threats, it is important to ascertain who exactly is targeting U.S. data.
Security professionals can consider strategies other than encryption, such as microsharding, to protect company data in the event of a ransomware attack.
Australia’s Cyber Security Minister Clare O’Neil said the government was considering a law that would make it illegal to pay ransoms.
What are eight steps that can help organizations achieve cybersecurity compliance?
There's an opportunity for chief information security officers to drive holistic business and information protection. Here's how.
Cybersecurity executives can explore three recent data privacy lawsuits to determine whether their organizations are truly compliant with data sharing laws.
University cybersecurity veteran Edward Hudson has been named the new Chief Information Security Officer (CISO) at the University of Kansas.
98% of organizations surveyed have been negatively impacted by a cybersecurity breach that occurred in their supply chain, according to a BlueVoyant cyber risk report.
The majority of enterprise IT security managers rely on threat intelligence to reduce cyber risk, yet still lack the necessary skills and resources, according to a Vulcan Cyber study.
To adequately address the skills gap and its impact on cybersecurity posture, organizations should take a two-pronged approach.
K-12 schools can transform students into cybersecurity leaders by focusing on security awareness training to prevent social engineering and cyberattacks.
It’s incumbent on physical security executives to understand how their counterparts may interpret data and view risks to the company based on their experience.
Focusing on fraud prevention should be a security priority for businesses creating and operating in the metaverse.
What can manufacturing businesses do to prevent ransomware attacks and limit their impact? Here are nine ways.
There are several best practices security teams can follow to strengthen their organization's defenses through multi-factor authentication.
The Business Cost of Phishing report from IRONSCALES shows that IT and security teams spend one-third of their time handling phishing threats every week.
Attack surface management is at the top of the list of needs for organizations to keep their business’ critical assets secure.
The State of Security Within eCommerce 2022 report, a 12-month analysis by Imperva Threat Research, identified cyber threats facing online retailers.
There is no one-size-fits-all approach to guiding a security program through a major transformation, but here are four things to consider to future-proof your enterprise.
This will come as no surprise to those involved in cybersecurity recruitment. The solution to the cybersecurity workforce shortage? Lowering the barrier to entry level cyber positions.
The Transportation Technology Trends 2022 Report from Info-Tech Research Group explores automation, data analytics and cybersecurity in the transportation sector.
At any given time, data retention laws may be added or altered, so Chief Data Officers (CDOs) need to stay current with retention laws to ensure compliance.
Security professionals need to prepare for the cyber and physical threats presented by the metaverse, including identity theft, bodily injury and more.
Lookout data reveals that the risk of mobile phishing and device vulnerability within U.S. government agencies has increased since 2021.
In this podcast episode, cybersecurity professional Lisa Tetrault talks leveraging industry connections to break into the cyber field; the power of mentorship in cybersecurity; and more.
Organizations seeking cyber insurance coverage are required to prove their cybersecurity posture, disaster recovery and related risk and technology best practices.
According to a Netwrix report, 61% of respondents in the healthcare industry suffered a cyberattack on their cloud infrastructure within the last 12 months.
IT auditors’ lack of hands-on skill in information technology influences data breach likelihood and technical evidence interpretation for critical infrastructure, according to The Next Generation Cybersecurity Auditor study.
Organizations have significantly matured their security postures since last year in response to operational technology (OT) and industrial control systems (ICS) cybersecurity threats.
How can organizations focus on building foundational security measures to take power away from cybercriminals?
108 million accounts were breached worldwide in Q3 2022, according to new cybersecurity research from Surfshark.
Organizations must take proactive steps to address the fundamental challenges of data protection, data storage and data compliance processes with cyberstorage solutions.
The Cybersecurity and Infrastructure Security Agency (CISA) has released the first iteration of the Cross-Sector Cybersecurity Performance Goals (CPGs).
Ransomware levels in the United States are trending down, with a decrease of 51% of ransomware attack volume compared to 2021 levels.
The Digital Identity Services report by iProov surveyed 16,000 consumers globally to assess their attitudes toward facial verification in security practices.
More than 255 million phishing attacks occurred over six months in 2022, a 61% increase in the rate of phishing attacks compared to 2021, SlashNext reports.
Why is cloud-based data more secure than you think? And how can you solve on-prem security issues and minimize the risk of cloud breaches?
Pam Presswood has been named the new Chief Information Officer (CIO) at Valor, a business services provider in mineral rights management.
Cryptocurrency firms are not immune from regulatory and legal obligations. Three best practices, however, can help firms ensure compliance and minimize regulatory risks.
New research from Genetec shows that cybersecurity remains a top concern for physical security professionals going into 2023.
During Q3 of 2022, Intel 471 observed 455 ransomware attacks, a decrease of 72 attacks recorded from the second quarter of 2022, according to the Leading Ransomware Variants report.
With CISOs required to present to their boards, they now face the challenge of articulating cybersecurity risks and opportunities, according to a survey by FTI Consulting.
Identity and access management (IAM) has been a fundamental security touchstone for as long as information security has been around. Unfortunately, it is not good enough anymore.
Airline security leaders must mitigate fraud while maintaining positive passenger experience as they book tickets and fly with airlines.
State of the Software Supply Chain Report from Sonatype found legacy open source downloads leading to cybersecurity vulnerability exploitation.
K-8 students can learn cybersecurity techniques through a gamified education platform called Cyber Legends. Learn more in this case study.
Here are five reasons why continuous threat simulation will help improve your cybersecurity.
The 2022 Cybersecurity Workforce Study from (ISC)² identified the current cyber workforce gap to be 3.4 million employees.
Passwordless authentication takes many forms, from biometrics to link-based access. Cybersecurity leaders can use these steps to secure their networks with passwordless strategies.
Wiper malware deployments are rising in 2022. With the right know-how and the right cybersecurity tools, security teams can ensure they’re bolstered for this battle.
The increase in remote and hybrid work, the transition from VPNs to zero trust network access and the shift to cloud-based delivery models are causing growth in cybersecurity spend, according to Gartner, Inc.
What generations pose more cybersecurity risk than others? The 2022 Human Risk in Cybersecurity Survey from Ernst & Young LLP asked employees about their cyber habits.
Insider risk remains an issue for organizations as hybrid work continues. Monitoring data, educating employees on cybersecurity and more can help companies remain secure.
Cyber risk is business risk, and protecting your brand from spoofing attacks is paramount to protecting your reputation and bottom line.
Here's how to avoid common pitfalls that lead to increases in expenditures, excessive business interruption time, and a prolonged, difficult claims process, during ransomware recovery.
The "Teacher and School Concerns and Actions on Elementary School Children Digital Safety" from North Carolina State University identified five digital safety concerns for K-12 students.
Auto dealerships across the U.S. have been targeted by phishing attacks. A new study examines what the car retailers are doing to mitigate cyber threats.
Comprehensive cybersecurity measures, such as security technology, risk management and education & training, are needed to secure the enterprise from inside out.
With the right tools and processes in place, businesses can provide consumers with a secure digital experience while mitigating fraud risks.
Discover five steps to boost data breach and cyberattack incident response.
Cybersecurity leadership needs to understand the security challenges of open source code to tackle software supply chain security threats.
Everything you need to know about the California Privacy Rights Act (CPRA), including three ways to ensure compliance and consumer privacy.
The cybersecurity industry could benefit significantly from diversifying its workforce, and when recruiting talent, it is critical that businesses strategically approach the onboarding process.
We cannot afford for social media to continue being an insider threat blind spot. The fallout from not properly managing and mitigating digital risk can result in irreparable damage to both individuals and organizations alike.
The most successful model for Kubernetes security will be one built on zero trust, one that embraces ephemeral JIT privileges, strong secrets governance and ZSP.
Enterprise organizations are concerned with the cybersecurity threat of dark data, according to a recent security report, "Understanding Risk: The Dark Side of Data" from Donnelley Financial Solutions.
Nearly two-thirds of small to mid-sized businesses experienced a cyberattack in the last 12 months, according to cybersecurity research from Devolutions.
A number of U.S. airport websites were temporarily taken offline after three pro-Russia cybercrime groups announced a wave of DDoS attacks targeting U.S. critical infrastructure.
Todd Dekkinga has been named Chief Information Security Officer (CISO) at Zluri, an enterprise Software as a Service (SaaS) management provider.
Legato Security integrated their video wall technology into their security operations center (SOC) to improve incident response and data visualization with a solution from Haivision.
National security and cybersecurity lawyer John P. Carlin has been named the new Co-Head of the Cybersecurity & Data Protection practice and as a Partner in Litigation at Paul, Weiss.
Vasu Kohli, who has led Iterable’s Security organization for the past ten months, has been promoted to Chief Information Security Officer (CISO).
Security leaders need to embrace strategies that can provide end-to-end visibility with open access to data across the entire innovation supply chain.
Organizations can close the cybersecurity skills gap and reduce cyber risk by working with external partners, such as managed service providers.
The 2022 State of the Threat Report from Secureworks identified software vulnerabilities as the primary initial access vector for ransomware.
Cybersecurity executive Mona Harrington has been promoted to the Assistant Director role at the National Risk Management Center (NRMC), a division of CISA.
Dr. Randall Magiera has been named Director of Information Security and Privacy at LucidLink, where he will scale risk assessment, compliance and more cyber efforts.
What are the top five questions chief information security officers (CISOs) should ask when it comes to evaluating and improving cybersecurity resiliency?
Organizations must meet compliance requirements in order to qualify for cyber insurance or reduce their insurance costs and cyber risk.
Google will pay an $85 million settlement to the State of Arizona for violating the state's Consumer Fraud Act with its location tracking feature.
Customer data is not the only thing on the line, as fraudsters utilize chat apps for scams. Businesses’ reputations are at risk too.
The COVID-19 pandemic accelerated e-commerce initiatives for small businesses, but it also catalyzed increased cyberattacks and cybersecurity challenges.
A survey from Nationwide identified weaknesses in small business cybersecurity posture, including a lack of employee cyber awareness and training.
Data privacy has grown so complex that it demands a technological solution, and it falls on cybersecurity and technology leaders to transform the way their organizations use data.
Identity and access management challenges facing organizations include disparate authentication practices, compliance and more, according to an Axiad survey.
The security community needs Cybersecurity Awareness Month, but we need to do it better in order to advance the mission of keeping people safe online.
Several hacker groups are assisting protestors in Iran using Telegram, Signal and other tools to bypass government censorship.
Security magazine has once again opened up nominations for the annual Top Cybersecurity Leaders program.
Chief information security officers (CISOs) can help the C-suite and their organization understand the importance of quantifying cybersecurity risk.
What does data protection and privacy mean in reproductive rights in the wake of Roe v. Wade being overturned by the Supreme Court?
Fast Company suffered an internal breach that led to the defacement of the company’s main news site.
Brand impersonation attacks are a real and imminent threat across the cybersecurity landscape. Security sits down with Mimecast's Amber Johanson to discuss this cyber threat.
As cloud adoption expands, so do cloud security challenges, with 81% of organizations suffering a cloud-related security incident according to Venafi research.
An alleged attacker, seeking a ransom payment from Optus in exchange for millions of customer records, published 10,000 records online before retracting the threat and deleting all demands.
Legislation seeking to address open source software security risks in the federal government has been introduced.
The 2022 New Jersey Cybersecurity Virtual Conference, hosted by Seton Hall University, aims to connect enterprise cybersecurity leaders with young professionals.
While there is no one-size-fits-all to security, here are some recommendations that organizations can use to reduce the threat of initial access brokers (IABs).
Hacktivism has played a role in the cyberspace around the Russian invasion of Ukraine, as nation-state cybercriminals and civilians hack with political motivation.
New Mexico's state government has founded a Cybersecurity Planning Committee to address cyber threats and data privacy in its communities.
It's inevitable that automation will play a role in cybersecurity strategies of the future, but it won't replace cyber operators in a security operations center (SOC).
Deepfakes use artificial intelligence (AI) to impersonate voices, images and videos to spread misinformation, affecting government and enterprise security.
The journey to passwordless is not short, but there’s a clear cybersecurity roadmap to reach that goal.
20 historically Black colleges and universities (HBCUs) are establishing Cybersecurity Leadership Centers in partnership with IBM to address staffing shortages.
In a panel titled "The Future of Cybersecurity" at the SECURITY 500 Conference, security executives will discuss enterprise cybersecurity and evolving cyber threats.
A security vulnerability in Oracle Cloud Infrastructure (OCI) could have allowed unauthorized access to cloud storage volumes of all users, according to Wiz cybersecurity researchers.
Damiano Tulipani has been named the new Senior Vice President, Chief Information Security Officer (CISO) at New Jersey-based Provident Bank.
Adversary attribution enables security professionals to understand the “who, how and why” behind the cyberattacks targeting potentially their business.
With the support of the Cybersecurity and Infrastructure Security Agency (CISA), CYBER.ORG is expanding Project REACH to train a diverse body of K-12 students for future cybersecurity careers.
The 2022 Consumer Impact Report from the Identity Theft Resource Center (ITRC) identified an over 1,000% increase in social media account takeovers in 2021.
American Airlines has confirmed that a data breach has affected a "very small number" of customers and employees.
The latest edition of the annual Building Security In Maturity Model (BSIMM) report highlights four evolving trends among organizations’ software security initiatives.
Rich Foltak, Chief Information Security Officer (CISO) at Dito, discusses cybersecurity as a business enabler in the latest Security podcast episode.
As the dust settles around Uber’s recent data breach, the internet will likely begin to point fingers at those who they deem responsible for the attack.
Cybersecurity leadership and human resources (HR) teams need to collaborate to close the cyber talent gap.
Former U.S. White House Chief Information Officer (CIO) Theresa Payton has joined Conceal's Board of Advisors.
Cybersecurity leader Craig Burland joins Inversion6, a cybersecurity IT company, with more than two decades of industry experience.
Is your disaster recovery system impervious to major disasters that take out the infrastructure you rely on to deliver service?
Cyber resilience is more than just a new way of talking about disaster recovery and business continuity. Here's a checklist you can use to identify blind spots and security gaps to improve cyber resilience across the organization.
Only 66% of cyber professionals say their organization prioritizes digital trust at a sufficient level, despite the devastating repercussions associated with a breach of digital trust, according to ISACA's new report.
There is no such thing as a “last line of defense” when it comes to security solutions. Instead, enterprise security needs to focus on detecting and mitigating data exfiltration.
Uber Technologies has suffered a cybersecurity incident that has impacted internal communications and engineering systems, the company confirmed.
The Federal Bureau of Investigation (FBI) has issued guidance for healthcare security leaders to protect medical devices from cyberattacks.
Wallace Dalrymple has been named the first Chief Security Officer (CSO) at Educational Testing Service (ETS), a standardized testing nonprofit.
The private sector can use the latest cybersecurity legislation as the roadmap for improving their security and digital infrastructure.
Discover three ways security operations centers (SOCs) can distribute cybersecurity alerts to avoid security employee burnout.
Security leaders say their organizations are failing to manage cyber risk. The 2022 Security Priorities Study, released by Foundry (formerly IDG Communications), explores how.
Healthcare organizations have been targeted by ransomware due to numerous factors, including theft of valuable health data and inadequate security.
The Information Security Maturity Report 2022 from ClubCISO powered by Telstra Purple identified how organizational cybersecurity has shifted during the COVID-19 pandemic.
Retail organizations faced higher rates of ransomware attacks than most other sectors, ranking second globally, according to the Sophos report "The State of Ransomware in Retail 2022."
Too often, chief security officers (CSOs) look at their role through two separate lenses: physical security and cybersecurity. But if you silo an organization’s cybersecurity and physical security, it only creates more risk.
Holiday Inn owner Intercontinental Hotels Group (IHG) has confirmed that a cyberattack has hit the company and disrupted operations.
A data breach of Nelnet Servicing (Nelnet) affected over 2.5 million student loan borrowers from Edfinancial Services and the Oklahoma Student Loan Authority (OSLA).
September is National Insider Threat Awareness Month, which emphasizes the importance of detecting, deterring and mitigating insider risk.
Maintaining a secure cloud infrastructure requires cybersecurity teams to automate at a pace similar to that of DevOps and take a proactive approach to risk.
Cybersecurity executive Emilio Valente has been named Chief Information Security Officer (CISO) at the University of California Santa Barbara.
As the cyber insurance industry continues to evolve, an industry-standard security framework will serve as a critical guiding light for companies and insurance providers.
Social engineering exploits human interactions to gain personal information and login credentials. Enterprises can protect networks from these cyberattacks.
After a cyberattack on the Parliament of Finland, the country will provide cybersecurity funding to businesses to improve cyber defense programs.
The San Francisco 49ers are mailing notification letters confirming a data breach that affects over 20,000 individuals.
Cloud sprawl is one of the top security threats organizations face today. What are some of the best strategies to fight cloud sprawl?
Sephora is the first company to be publicly fined for violating California’s Consumer Privacy Act (CCPA).
AMTSO has published its first Guidelines for Testing of IoT Security Products to provide guidance for independent benchmarking and certification of IoT security solutions.
Faith Roy has been named Deputy Chief Information Security Officer (CISO) at the U.S. Department of Veterans Affairs.
NAF and CYBER.ORG have partnered to expand cybersecurity literacy in high school classrooms across the country.
For companies using artificial intelligence-powered security technology, protecting users is not only ethical, but it also makes business sense.
A survey of more than 700 U.S. executives by PricewaterhouseCoopers (PwC) identified top enterprise security and business risks observed in 2022.
Listen to the latest Cybersecurity & Geopolitical Podcast episode with Ian Thornton-Trump, Philip Ingram, MBE, and Joe Wrieden on the Trickbot leaks.
K-12 safety leaders and other school stakeholders can register for the Cybersecurity and Infrastructure Security Agency (CISA)'s 2022 National Summit on K-12 School Safety and Security.
Seven women from across the security field have received scholarships from the 2022 SIA Women in Security Forum to further educational opportunities and promote career advancement.
Many organizations lack visibility into unauthorized public cloud data access, according to a new Laminar survey.
Cybersecurity leaders can outsource security to increase their cyberattack readiness. U.S. chief information security officers (CISOs) share their priorities and what they delegate.
Security magazine sits downs with David Mahdi, Chief Strategy Officer and Chief Information Security Officer (CISO) Advisor at Sectigo, to discuss why enterprise security leaders must establish digital trust.
Chip Gibbons, Chief Information Security Officer (CISO) at Thrive Network, shares tips for bank security leaders combatting phishing and business email compromise.
Medical organizations in the United States have suffered nearly 5,000 data breaches that account for 342 million medical records, according to Comparitech research.
Instead of having 40+ different security products, organizations need to rethink their security approach. Converging cybersecurity tools may be the answer.
Elizabeth Wharton, Vice President of Operations at SCYTHE, was honored with the Cybersecurity or Privacy Woman Law Professional of the Year for 2022 by the United Cybersecurity Alliance.
The threat actors responsible for several recent cyberattacks, including Twilio, MailChimp and Klaviyo, compromised more than 130 companies, using the same phishing campaign.
Critical infrastructure remains a target for cyberattacks. Security awareness training is critical to preventing business disruptions in the sector.
Machine identities have been used in recent nation-state cyberattacks, according to a study of enterprise security leaders from Venafi.
Peiter “Mudge” Zatko, former head of security at Twitter, has accused Twitter of “extreme, egregious deficiencies” in its spam and hacker-fighting practices.
What are four critical areas every cybersecurity leader should invest in to help set up their information security team up for success?
The most satisfied cybersecurity professionals are those who choose where to work, according to a new (ISC)² member poll.
The California Age-Appropriate Design Code Act (ADCA) is under consideration in the state. The bill would increase data privacy regulations for users under 18.
Due to the geopolitical landscape, organizations must adopt cybersecurity risk management supported by a risk-aware culture and security technologies.
Matt Price, Head of Intelligence and Investigations, Americas at Binance talks using digital forensics to investigate cryptocurrency fraud and financial crimes in this podcast episode.
As Bowman’s CIO and CISO, Matt Mullenix will oversees the people, processes and technologies within the company’s IT/cybersecurity organization.
Healthcare cybersecurity teams can improve their network security with a three-point plan focused on prevention, detection and vigilance.
For those of us waiting for a national data privacy law, there’s good news. The American Data Privacy and Protection Act (ADPPA) has already made it further than any other federal privacy law and faster than many expected.
The “Identity Data Management: Roadblock or Business Enabler” report by Gartner Peer Insights and Radiant Logic found that two-thirds of organizations have experienced identity-related data breaches.
Apple has disclosed security vulnerabilities affecting iPhones, Macs and iPads and released cybersecurity software updates for affected devices.
The U.S. Department of Energy will allocate $45 million to protect the electric grid from cyberattacks.
Organizations are concerned about third-party security breaches, with 48% concerned about potential data loss as a result of such risks, according to Proofpoint.
After concerns about misinformation spread via social media affecting the 2020 presidential election, Meta details their policies for voting information ahead of the 2022 U.S. midterm elections.
Data privacy and security, and a lack of in-house cybersecurity expertise, and controlling costs — what are some of the top cloud obstacles?
The State of Machine Identity Management report from Keyfactor examined the role of public key infrastructure (PKI) and machine identities in securing modern enterprises.
In 2021, the ITRC received the highest number of contacts in its history about identity crimes and requests for assistance to prevent identity misuse.
The “2022 Mid-Year Outlook State of Protective Intelligence Report” by the Ontic Center for Protective Intelligence surveyed risk management & security professionals to determine enterprise threat levels.
A survey seeks to determine the gender diversity of the Australian cybersecurity sector and identify how to close the cyber skills gap.
As much as cybersecurity is emblematic of Managed Service Providers (MSP) burnout, it can also provide relief. Here are a few ways to fight fire with fire.
Organizations looking to expand their cloud adoption can incorporate zero trust principles to manage identity and access across their network.
Learn about four levels of cybersecurity resilience.
A master data management approach can help organizations prepare today for tomorrow's data privacy, compliance and regulatory challenges.
The 2022 Honeywell Industrial Cybersecurity USB Threat Report found elevated threat levels regarding USB-borne cyberattacks on the industrial sector.
Software Bill of Materials (SBOM) are a critical tool in protecting enterprise and government organizations from software supply chain security threats.
Researchers at Cleafy discovered a version of SOVA that appears to be targeting more than 200 mobile applications, including banking apps and crypto exchanges/wallets.
The BlackBerry Cyber Insurance Coverage study surveyed 450 information technology (IT) and cybersecurity decision-makers about their cyber insurance coverage and ransomware protection levels.
Is your organization a good candidate for Secure Access Service Edge (SASE)? Here are six indicators that suggest it could be.
Default security configurations, weak passwords and human error are the top vectors for cyberattackers targeting enterprise networks. Penetration testers share how to avoid these cyber risks.
The Federal Trade Commission will be exploring rules to crack down on lax data security and harmful commercial surveillance.
For chief information security officers (CISOs) and their organizations, the question is not if the cybersecurity budget should be cut. It's how much risk they are willing to take.
Chief information security officers (CISOs) must be early adopters and explore emerging cyber technology if they hope to keep ahead of cybercriminals.
Employee monitoring needs to be approached correctly. Too often, poorly constructed plans, bad communication and unreasonable expectations get in the way of a successful implementation.
The Cybersecurity and Infrastructure Security Agency (CISA) released a catalog of free services and tools available for state and local election officials to improve the cybersecurity and resilience of their infrastructure.
Let's explore two top identity-based attacks — phishing and third-party accounts — and ways organizations can implement cybersecurity best practices to defend against these.
Email security threats are increasing, according to the H2 2022 Email Threat Report from Abnormal Security.
Austin Siders has been named Chief Information Officer (CIO) at the University of Southern Indiana, where he will lead tech and cybersecurity efforts.
Christine Whichard, new Chief Information Security Officer (CISO) at SmartBear, has been an instrumental leader in the company’s cybersecurity plans, including an overhaul of its Information Security program.
Security sits down with Meg West, X-Force Cybersecurity Incident Response Consultant at IBM, to answer reader questions about enterprise cybersecurity insights, burnout and more in a new podcast episode.
Let's examine nine different categories of threats against the metaverse and inside the metaverse, including cyber-physical crime, financial fraud, legal implications and more, according to Trend Micro.
To meet the security issues of today, organizations must now shift to object-based backup storage.
Web3 is coming — what will that mean for enterprise security? This blockchain-based version of the internet may present new cybersecurity challenges.
Office communication platform Slack has admitted to accidentally exposing the hashed passwords of some users.
3.4 billion phishing attacks are raining on us every day. With summer now upon us, it seems that everyone is on vacation. Here are three tips to get your business ready for phishing season.
Cybersecurity executive Justin DePalmo has been named Vice President, Chief Information Security Officer (CISO) at General Dynamics Information Technology (GDIT).
Cyber actors have used credential stuffing bot attacks to obtain and then resell pharmacy account details, giving unauthorized individuals access to prescription drugs.
Amid pandemic disruptions, burnout and geopolitically motivated cyberattacks, what are the challenges faced by security teams? VMware's Global Incident Response Threat Report shines a light on emerging cyber threats.
While the cyber industry has traditionally focused on recruitment, focusing on upskilling workers can help remedy the cybersecurity talent shortage.
What are the most prominent identity-based attacks and how are they carried out? And how can security teams leverage identity technologies to mitigate those attacks and reduce their organizational risk?
The Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) have released an advisory on top malware strains in 2021.
North Carolina State University and three partners will research strategies for software supply chain security and building a diverse cyber workforce.
Annette Southgate has been named Director of Security at Cranfield University, a U.K.-based technology, defense and security institution.
The “phygital” attack, which bridges “physical” and “digital,” are a serious threat to critical infrastructure. What can chief security officers (CSOs), chief information security officers (CISOs), and other security personnel do to protect companies against them?
A new Akamai report reveals that cyberattacks on player accounts and gaming companies increased dramatically in the past year, with web application attacks doubling.
The Synopsys Cybersecurity Research Center (CyRC) team has identified a local privilege escalation vulnerability in Kaspersky VPN Secure Connection for Microsoft Windows.
One-third of organizations experience at least one ransomware attack per week, with 9% of enterprises experiencing one daily, according to a report from Menlo Security.
What are some cybersecurity threat trends that will likely dominate the landscape in 2023 and beyond? A new Intel 471 report reveals threats organizations need to prepare for.
How can your organization implement a zero trust security model while safeguarding biometric data?
The top universities in the United States, the United Kingdom and Australia are lagging on basic cybersecurity measures, according to new Proofpoint research.
Researchers at the University of Florida and other collaborators are working to understand how inequity in tech and cybersecurity design affects marginalized populations.
Cybersecurity researchers at CloudSEK have uncovered a set of 3,207 mobile apps exposing Twitter API keys to the public.
Learn about the five main types of voice scams that can lead to data breaches, security vulnerabilities and loss of productivity for enterprise security.
Managing enterprise identities in a multi-cloud environment presents a challenge to cybersecurity leadership. Discover identity and access management (IAM) best practices here.
Michael Neuman has been named the new Chief Information Security Officer (CISO) at Backstop Solutions Group.
The overall average cost of a data breach is now $15.01 million, according to new Black Kite research.
Telegram has been growing in use among cybercriminals, Intel 471 found.
With a significant cybersecurity skills gap and increasing cyberattacks, organizations need all the advantages they can get. A programmatic cyber-awareness training program is one such advantage.
Tenet Healthcare reported it suffered a $100 million financial impact from a cyberattack, mostly caused by lost revenues and remediation costs.
Learn about corporate espionage and three key steps security leaders and their companies should take to prevent data exfiltration and other insider threats.
The Strengthening Cybersecurity in Medical Devices Act has been introduced in Congress — what ramifications will it have for healthcare security leaders?
The U.S. Department of Justice is investigating a data breach that involves the federal court records management system.
Long-time cybersecurity expert Tomer Gershoni will lead ZoomInfo's security team, overseeing physical and digital security and privacy efforts as its Chief Security Officer (CSO).
Here are a few ways chief information security officers (CISOs) can safeguard visibility while mitigating cybersecurity risks in the supply chains for physical goods.
Darrin Reynolds has been named the new Chief Information Security Officer (CISO) at Edgio.
The Third-Party Vendor Risk Management in Healthcare report from the Cloud Security Alliance (CSA) provides an overview of the third-party vendor security risks healthcare organizations face.
As Chief Information Officer at Deep Instinct, Carl Froggett will play a key role in enhancing the company's enterprise security and cybersecurity posture.
The risk assessment process shouldn't be dreaded. Get ready to breathe easier with six steps to move toward a smoother risk assessment process and much tighter security.
How can companies update their cybersecurity strategy in 2022 to prevent data compromise and stay away from a data breach?
Rob Thompson has been named as Wayne State University’s Chief Information Officer (CIO) and Associate Vice President for Computing and Information Technology (C&IT).
The Q2 2022 Emerging Risks Report from Gartner surveyed 306 business and risk management executives to determine the latest risk trends affecting enterprises today, such as supply chain security, inflation and loss prevention.
In the latest The Security Podcasts episode, Tom Thimot, CEO of authID.ai, offers a unique perspective on the concerns raised around ID.me’s technology, where they went wrong with the IRS, and the drawbacks of facial recognition technology.
The Q2 2022 Brand Phishing Report from Check Point Research (CPR) found that LinkedIn is the most-impersonated brand when it comes to phishing campaigns.
For improved healthcare cybersecurity, NIST has released an updated draft of the HIPAA security rule guidance.
The new TSA security directive takes a performance-based approach to enhancing cybersecurity for pipeline owners and operators.
While businesses have taken risk management into the digital age, morphing governance, risk and compliance into digital risk management (DRM), many organizations missed one vital component of DRM — namely, compliance as a code.
A report from Gigamon explores the culture of blame in cybersecurity and its effect on incident reporting.
T-Mobile has agreed to pay $350 million to customers affected by a data breach, in an effort to settle a class action lawsuit.
Despite good intentions, over 60% of companies have a long way to go to protect privileged identities and access, according to a Delinea report of IT security decision makers.
Cybercriminals have started to use messaging apps like Discord and Telegram to spread malware, according to Intel 471 security research.
When it comes to compliance and data privacy, ignorance is not bliss. Today’s businesses must be aware of the regulations that govern them or risk incurring significant, potentially crippling penalties.
The Global Study on Zero Trust Security for the Cloud from Appgate and conducted by the Ponemon Institute surveyed security professionals to examine cloud security and zero trust practices.
The 2022 Mid-Year Horizon Report: The State of Cybersecurity in Healthcare from Fortified Health Security illustrates how healthcare providers, health plans and business associates need to bolster their security posture.
"The Evolution of Cybercrime: Why the Dark Web is Supercharging the Threat Landscape and How to Fight Back" report from HP Wolf Security dives into the inner workings of the dark web.
As Senior Vice President, Chief Information Security Officer at Accolade, Kelli Burns will lead the information security business unit and support the overall compliance and risk management function.
As the number of cyberattacks rise, organizations must reconsider their approach to cybersecurity to be more proactive rather than reactive, which is why the adoption of proactive auditing, among a wider offensive cybersecurity approach, is so essential.
The Minorities in Cybersecurity (MiC) Annual Conference will take place from March 28 to 30, 2023 at NYLO Las Colinas in Dallas, Texas.
Two ransom payments made by U.S. healthcare providers were recovered by law enforcement and returned to victims, the Justice Department announced.
Cyberattackers are now sending phishing emails from PayPal using social engineering, Avanan research reveals.
Files released to the ACLU by U.S. Customs and Border Protection (CBP) reveal widespread purchases of cell phone location data by the Department of Homeland Security (DHS).
The Ethiopian government is implementing a national identification program using biometrics to create digital IDs for its citizens.
Mikhail Lopushanski, a risk management and IT auditing specialist, has joined Heritage Bank as the new Chief Information Security Officer (CISO).