Les McMonagle, a cybersecurity strategist, has been named Chief Strategy Officer at Mage, formerly MENTIS Inc.
from Cyber Security News https://ift.tt/15NnSve
Live Player 3.2 extension and toolbar is a corrupt browser application that ruins Firefox, Google Chrome and Internet explorer, etc. The Live Player 3.2 virus comes as a free TV channel player which offers its user watch various international TV shows and programs without paying anything. But soon after this program has been installed, you,ll
Les McMonagle, a cybersecurity strategist, has been named Chief Strategy Officer at Mage, formerly MENTIS Inc.
Jeffrey Wheatman has joined Black Kite as Senior Vice President, Cyber Risk Evangelist. He will work with users to strengthen their risk management, and help mitigate cybersecurity and third party risk.
A cyberattack on the Russian Federal Air Transport Agency's (Rosaviatsia) infrastructure allegedly erased all documents, files, aircraft registration data and emails from the servers.
March 31st is World Backup Day. Cybersecurity leaders discuss the importance of backing up enterprise data to prevent data loss and reduce cyberattack effects.
Nearly a third of the world’s largest business websites suffer a security and/or data breach every single week due to their content management systems (CMS), according to new Storyblok research.
While looking into the Wyze Cam security devices, security researchers found several security vulnerabilities that let an outside attacker access the camera feed or execute malicious code to further compromise the device.
With the number of cyberattacks faced by enterprise organizations, security teams need to rely on artificial intelligence to mitigate risk. However, a fully automated approach to cybersecurity presents challenges as well.
With the support of Europol, law enforcement agencies in Latvia and Lithuania detained over 100 people suspected of defrauding victims across the world in an international call center scam.
Private mobile networks make it a great candidate to solve the security challenges and the mobility problem that the Industry 4.0, Digital Transformation, and Industrial Internet of Things (IIoT) bring.
Cybersecurity nonprofit (ISC)2 released a poll outlining the top concerns of security leaders as the Russian invasion of Ukraine progresses.
The Identity Defined Security Alliance (IDSA) will host the Identity Management Day Virtual Conference 2022 on April 12, 2022, aiming to increase awareness about identity management and cybersecurity.
One in four employees lost their job in the last 12 months, after making a mistake that compromised their company’s security, according to new data by Tessian.
Mark Strosahl has joined Penn Mutual Life Insurance Company as Chief Information Security Officer (CISO). Strosahl has over 14 years of financial services industry experience leading information technology and information security functions.
Ukrtelecom, a major mobile service and internet provider in Ukraine, was hit by a cyberattack.
Hack the Port 22 allowed students interested in hacking and cybersecurity to hone their skills in cyber competitions and learn from industry and government cyber professionals.
From unalignment in safety and cybersecurity regulations and standards to the increased risk of cyberattacks in functional safety systems as they become better connected, there is a need for security experts to expand and deepen collaboration to close the gap between functional safety and cybersecurity.
The United States and the European Commission have reached a deal in principle regarding the transfer and storage of European data on U.S. soil. Data privacy experts warn that the commitment may be too vague to maintain cybersecurity standards.
A survey by ProtonVPN found that social media sites were the most common website type to suffer a data breach, followed by gaming and technology websites.
For the past many years, the focus in cybersecurity has been on collecting data. But now, cybersecurity leaders are drowning in data, which is introducing a new type of risk to organizations. By increasing their data observability capabilities, organizations can improve performance, threat detection, incident response and other key processes.
With digital transformations, the goal is to transform data security teams from gatekeepers to enablers capable of performing at the speed of the cloud.
As the Russian invasion of Ukraine continues, cybersecurity professionals are on the lookout for cyberattacks following the Kremlin's initial strategy of hacking the Ukrainian government.
Organizations are turning to zero trust access technologies to address security issues related to third-party risk.
The latest Security podcast features Arti Lalwani, Risk Management and Privacy Knowledge Leader at A-LIGN, who discusses her career journey through auditing, risk and data privacy.
Data privacy legislation has popped up across the United States, largely regulated by individual states. The California Privacy Rights Act (CPRA) has wide-reaching effects for U.S. enterprise organizations.
Security teams have an unprecedented number of assets to inventory, manage and secure across a cloud-based organization, according to a new JupiterOne report.
Organizations can improve their security profile by implementing a plan that includes best practices and rules for compliance along with the technology to implement it.
The White House urged private organizations to bolster their cybersecurity defenses, as intelligence suggests Russia is exploring options for potential cyberattacks to target U.S. critical infrastructure.
Identity and access management company Okta is investigating a possible data breach after ransomware group Lapsus$ claimed to have hacked the company.
Ransomware as a service (RaaS) affiliate group AvosLocker has targeted a number of victims across multiple critical infrastructure sectors. Here are a few mitigation strategies organizations can implement.
Ian Thornton-Trump, Chief Information Security Officer (CISO) at Cyjax, and Philip Ingram, CEO of Grey Hare Media, take a closer look at the Russian invasion of Ukraine through the lens of conflict in the Middle East in the tenth episode of The Cybersecurity and Geopolitical Podcast.
Retail security leaders play an important role regarding business continuity. Incorporating SASE and SD-WAN can help businesses stay resilient in a changing retail environment.
There isn’t a silver bullet to consumer data privacy; different organizations are at different stages of privacy maturity. However, there are four steps organizations can take to advance their data privacy program maturity.
K-12 school administrators and cybersecurity leaders outlined their top four challenges to securing their educational institutions in the "Creating a Common Culture of Action Around Cybersecurity: 2021 National K-12 Education Cybersecurity Report" from iboss.
A new Cequence Security API Security Threat Report: Bots and Automated Attacks Explode revealed three attack trends in API security.
When it comes to building a security-first culture, a layered approach that takes physical security, security solutions and training into consideration is best.
Russian state-sponsored cyberattackers gained network access to a non-governmental organization by exploiting default multi-factor authentication (MFA) protocols and PrintNightmare, a known security vulnerability.
For teams looking to respond to evolving mobile security threats, the Zimperium 2022 Global Mobile Threat Report offers some insights.
Cybercriminals have begun to leverage the Russian invasion of Ukraine to target phishing victims by posing as legitimate aid organizations.
Meta has been fined $18.9 million by the Irish Data Protection Commission for Facebook’s 2018 data breaches that violate data security and privacy, according to the European Union’s General Data Protection Regulation (GDPR).
Sailaja Kotra-Turner has been named Chief Information Security Officer at Brown-Forman Corporation, a beverage and spirits firm.
Rinki Sethi has joined Bill.com as Vice President and Chief Information Security Officer. Sethi will lead the risk management, global information security and technology functions and efforts, protecting
Nominate a security leader to be named one of Security magazine's 2022 Most influential People in Security!
The cybersecurity threats posed by Russia have been top of mind since prior to the Russian invasion of Ukraine. From critical infrastructure shutdowns to ransomware, what implications does the conflict hold for cybersecurity?
The Securities and Exchange Commission (SEC) has proposed changes to standardize public companies’ disclosures regarding cybersecurity risk management, strategy, governance and incident reporting.
CISA's Cyber Storm exercise simulates a significant cybersecurity incident impacting critical infrastructure to improve risk management, incident response planning, information sharing and cyber response activities.
As of March 15th, the United States was ranked third when it comes to being the target of cyberattacks, with 7% of global cyber threats targeting users in the country. The U.S. ranks behind Russia and Ukraine.
There are four security protocols to consider when reviewing an enterprise's public cloud risk profile.
The 2022 Cloud Security Alert Fatigue Report from Orca Security found that 55% of cybersecurity teams have missed critical security alerts due to alert overload and ineffective security prioritization.
Don’t get too caught up in the excitement of March Madness. Cybercriminals will use social engineering, phishing, malware, ransomware and other cybersecurity strategies to wreak havoc. Boost security defenses now.
Let’s look at lateral movement further and explore why it is important and how to minimize the impact of adversaries moving around your environment.
Critical infrastructure operators are now required to report ransomware attacks, data breaches and other incidents to the Cybersecurity and Infrastructure Security Agency (CISA).
Let’s look at the eight predictions that are likely to have the biggest impact on networks in the coming year and why they are so important to prepare for.
The 2021 Healthcare Data Breach Trend Report from Protected Harbor gives insight into evolving healthcare data breach patterns, predictive threats for 2022, and a playbook on how to increase information technology (IT) durability to stop future healthcare data attacks.
Josh Yavor, Chief Information Security Officer (CISO) at Tessian, talks about the “leap-of-faith” decision he made four years ago that helped address his own feelings of burnout, and how CISOs can lead by example, setting boundaries and accountability at the C-suite level.
Cybersecurity and Infrastructure Security Agency (CISA) Executive Assistant Director for Cybersecurity Eric Goldstein outlined CISA's top cyber defense priorities, including defending against cyberattacks, zero trust and more.
China-backed hacker group APT41 has breached six U.S. state governments, two of which were exploited by the zero-day vulnerability Log4Shell.
The Security Industry Association (SIA)'s Women in Security Forum has released the inaugural Power 100 honoree list, which highlights 100 women advancing leadership and inclusion in the security industry.
A robust communications plan touching on ethical concerns, user experience, education and transparency might help to dispel the public’s concerns about facial recognition.
Microsoft says it found FoxBlade, a new malware that targets digital infrastructure, hours before Russia began its invasion of Ukraine on February 24.
Video conferencing platforms like Zoom, Cisco, Google and Microsoft have helped enable remote work — but they also present security challenges. An international consortium reviewed the state of video teleconferencing platforms and how cybersecurity leaders can ensure their safety.
Dan Dennis has been named Hyland's Senior Vice President and Chief Information Security Officer (CISO).
Consumer electronics company Samsung has confirmed a significant data breach.
Cybersecurity professionals name Hafnium, DarkSide and others as their top concerns when it comes to cybercrime rings, according to the Immersive Labs Cyber Workforce Benchmark report.
Women in the physical security and cybersecurity industries talk their careers and promoting diversity and inclusion on International Women's Day 2022.
Get ready: Security magazine's March 2022 issue is here! Inside, find the 2022 Top Cybersecurity Leaders special report, stories on COVID-19 security lessons learned, NGO and travel risk management, and much more!
The Russian government has blocked Facebook and restricted content on Twitter amid its ongoing invasion of Ukraine. VPN services have risen in adoption since the ban.
More than half of leading cybersecurity firms host at-risk databases, according to a new Reposify security report.
Following warnings from DHS and CISA about potential Russian cyberattacks on U.S. organizations, the Senate has passed the Strengthening American Cybersecurity Act of 2022.
Several nonprofit cybersecurity organizations launched Nonprofit Cyber, a first-of-its-kind coalition of global nonprofit organizations to enhance joint action to improve cybersecurity.
A survey from the Security Executive Council (SEC)'s Security Leadership Research Institute (SLRI), in partnership with Kennesaw State University’s Coles College of Business, will research the current state of security convergence.
Microsoft says it found FoxBlade, a new malware that targets digital infrastructure, hours before Russia began its invasion of Ukraine on February 24.
American chipmaker NVIDIA was the victim of a ransomware attack.
The Institute of Pervasive Cybersecurity at Boise State University has introduced its Cyberdome initiative in partnership with Stellar Cyber, which aims to reduce rural cyber risk and expand the cybersecurity workforce in Idaho.
Nine suggestions for defending your organization against cybercrime or cyberwarfare.
Cybersecurity leader and former Chief Information Security Officer (CISO) Don Pecha has been named the Senior Director of Information Security at FNTS.
The majority (95%) of organizations have experienced an API security incident in the past 12 months, according to Salt Security’s Salt Labs State of API Security Report, Q1 2022.
Identity theft and imposter scams were some of the top fraud techniques employed by scammers to defraud users out of $5.9 billion in 2021, according to data from the Federal Trade Commission (FTC).
As tensions flare between Russia and Ukraine, the term wiperware or pseudo ransomware may pop up. Let’s break down what this means.
Colonial Pipeline named Adam Tice as its first ever Chief Information Security Officer. Tice will oversee and be responsible for Colonial Pipeline's information and data security program.
Toyota plastic parts supplier Kojima Industries (Kojima) has suffered a cyberattack that forced Toyota Motors to suspend the operation of 28 production lines across 14 plants in Japan for a day.