This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The number of cybersecurity mergers and acquisitions deals in 2021 set a record pace. Many of the 2021 transactions CSO reported were in the identity and cloud security markets, especially toward the end of the year. The first three quarters of the year saw 151 transactions in the industry, according to 451 Research.
Education and research were the top targets for cyberattackers in 2021, with an average of 1605 attacks per organization per week, a 75% increase from 2020, according to research by Check Point Software Technologies. Pandemic’s push for digital invites threats .
For 2021, the judges took on a record number of submissions, identifying which products, people and companies stood out during a tumultuous year. Click here to see the full list of 2021 SC Award finalists. Chuck Brooks is president of Brooks Consulting International and an ambassador for the Cybersecurity Collaborative.
In early December 2021, enterprise security teams around the world went on high alert because of a string of vulnerabilities in an open-source Java component, Log4j, that is used in millions of applications.
In May 2021, the GAO’s director of information technology and cybersecurity, Vijay A. Get the latest from CSO by signing up for our newsletters. ]. Get the latest from CSO by signing up for our newsletters. ]. D’Souza, testified before Congress on supply chain risks.
Case in point: A federal judge recently ordered Uber Technologies to work with its former CSO, Joseph Sullivan (who held the position from April 2015 to November 2017), and review a plethora of Uber documents that Sullivan has requested in unredacted form for use in his defense in the upcoming criminal trial.
On February 23, 2021, a bipartisan group of leading Congress members introduced the Cyber Diplomacy Act of 2021. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ]. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
Insider breaches are growing – because you can actually see them In their annual look at trends in cyber security , Forrester made a few startling revelations: 33% of your breaches in 2021 are going to be insider threat related. Insider threat incidents are expected to grow 8% in 2021 .
As NETSCOUT’s 1H 2021 Threat Intelligence Report shows, the long tail of cybercrime innovation swept through the lockdown days of the COVID-19 pandemic to infiltrate the bulk of 2021. The vulnerabilities introduced by the global shift to online work and play are admittedly an outlier event.
Dan Meacham is chief information security officer and CSO with Legendary Entertainment, the production company behind Godzilla vs. Kong and other popular films such as The Dark Knight and Jurassic World. Click here to access all coverage of the 2021 SC Awards. Here, he hang out in the voiceover studio. Legendary Entertainment).
Well, the stats are even scarier with over 50% increase in ransomware attacks in 2021, compared to 2020. About the essayist: Den Jones, CSO at Banyan Security , which supplies s imple, least-privilege, multi-cloud application access technologies. Ransomware? I think you may have heard of it, isn’t the news full of it?
Nor can technology alone solve the security challenges facing the user community. Joining SC Media Deputy Editor Bradley Barth for the discussion is Dan Meacham, chief information security officer and CSO at Legendary Entertainment, and Hossein Ghazizadeh, chief services officer at Barracuda Networks.
Symphony Technology Group (STG) completed the acquisition of FireEye in October 2021, and then combined FireEye with the enterprise business of McAfee, which had been previously acquired in July 2021. To read this article in full, please click here
In the first half of 2021, cyberattackers launched 5.4 In just the first half of 2021, one ransomware group collected $100 million in payments. There’s no question that ensuring enterprise network security is becoming increasingly difficult for IT and security teams. And cyberattacks equate to big paydays for attackers.
cybersecurity M&A deals hit 151 in the first three quarters of 2021, compared to 80, 88 and 94 in 2018, 2019 and 2020, respectively, according to data from 451 Research. According to CSO, 2021 shaped up to be an active year for mergers and acquisitions in the cybersecurity industry. In fact, the volume of U.S.
In 2022, we will see 5G go from new technology to a business enabler bringing previously unimaginable use cases because of its high bandwidth and lower latency. Data from the current AT&T Cybersecurity Insights Report shows that 5G technology is being driven by the line of business and has been siloed between IT and OT organizations.
An April 2021 report by research firm Gartner forecast that worldwide spending on public cloud services will grow 23% this year. Emerging technologies such as containerization, virtualization, and edge computing are becoming more mainstream and driving cloud spending, the report said.
Edge computing is gaining traction quickly – with some analysts deeming it the next great revolution in technology. This new technology paradigm brings a number of benefits, but it also requires a new approach to security given how distributed users and data are today. billion by 2024. To read this article in full, please click here
The report surveyed the threat landscape between April 2020 and July 2021. The technology “tears at the heart of privacy of individual citizens” but is also fallible and could be evaded by those meant to be targeted, and misused, they added. . MORE Six takeaways from major breaches and attacks in 2021. VPNs, TTFN? Sign up here.
Engineering workstation compromises were the initial attack vector in 35% of all operational technology (OT) and industrial control system breaches in companies surveyed globally this year, doubling from the year earlier, according to research conducted by the SANS Institute and sponsored by Nozomi Networks.
We are unsure what the rest of 2021 has in store, but the most successful CISOs will be the ones ensuring security teams have access to the latest intel and tools to be prepared for emerging threats. In March 2021, President Biden signed the $1.9 James Carder, CSO, LogRhythm.
Companies that produce location-tracking algorithms and technological magic are riding the hyper-personalized marketing rocket, which continues to expand at breathtaking speed. In the fall of 2021, Grandview Research estimated the U.S. It is the holy grail of marketing, and infosec’s nightmare. from 2022 to 2030.
Dubbed IceApple, the.NET-based framework has been observed since late 2021 in multiple victim environments in geographically diverse locations with targets spanning the technology, academic and government sectors, according to CrowdStrike’s report.
In fact, the percentage of organizations with zero trust already in place more than doubled in just one year, jumping from 24% in 2021 to 55% in the 2022 survey issued by identity and access management technology provider Okta.
Businesses’ use of email is increasing, with 82% of companies reporting a higher volume of email in 2022 compared with 2021 and 2020, the 2023 SOES report found. More email has led to more email-based threats, and 74% of respondents said these have risen over the past 12 months.
More organizations are transforming their businesses by embracing DevOps principles, microservice design patterns, and container technologies such as Docker and Kubernetes. These increasingly popular technologies can help organizations improve processes such as configuration management, patch management, compliance, and governance.
2021 will be known as another year full of painful ransomware. In fact, according to our 2021 Digital Defense Report , ransomware attacks have evolved significantly to now include crippling network-wide attacks using multiple extortion methods to target both your organization’s data and reputation, all enabled by human intelligence.
We asked 1,172 IT professionals their thoughts and whether or not they are currently pursuing certifications and in which areas of technology? Do more certifications lead to new jobs, promotions or a pay rise?
To carry out the alleged heist, the employee didn’t even use the type of sophisticated technology that you might expect. Our own data shows this type of exfiltration is shockingly common with removable media still accounting for 42% of data exfiltration as of March 2021. To read this article in full, please click here
billion in 2021 alone. So, given this predicted trajectory, how should organizations evaluate their current technology suite against today's most pressing threats? By Microsoft Security The threat landscape is more sophisticated than ever, and damages have soared as cybercriminals become smarter and their attacks grow savvier.
Watch the on-demand webinar , in which Phillip Hayes, Tenables Director of Information Security, and Michael Garman, Tenables Senior Manager of Technology Engineering, discuss a variety of cloud security best practices. The 5,263 ransomware attacks observed by NCC Group in 2024 were the most since it started monitoring them in 2021.
By Amanda Fennell, CSO and CIO, Relativity. Amanda joined the Relativity team in 2018 as CSO and her responsibilities expanded to include the role of CIO in 2021. But tools and processes alone are two variables in an incomplete equation. People are the linchpin in any organization’s security posture—and the wildcard.
There has been massive growth in the encryption of Internet traffic—from 50% in January 2014 to 95% as of March 20, 2021, according to Google’s Transparency Report. However, adversaries are also using the technology. This rise is a double-edged sword.
The Verizon DBIR 2021 points to some 85 percent of all breaches being because of a human element—as in a weakness being exploited. We need to take user protection seriously, change the security paradigm, by studying and building protections around people and processes, rather than solely focusing on technology. What more can be done?
Jeff Moss, ICANN CSO and founder of DEF CON/Black Hat, gave the keynote speech at SecTor 2021 in Toronto, Ontario. He also said that "hacking will influence all industries and technologies." His talk was nostalgic, reflecting on the 40+ years of computer hacking. He said security work is that like that.
The 2030 Roadmap for Israel-UK Bilateral Relations is the culmination of efforts that began with the signing of a Memorandum of Understanding in November 2021 to work more closely over the next decade on security, technology, trade, and defense. To read this article in full, please click here
According to data from the Rekt leaderboard , cybercriminals have stolen as much as $3 billion of investor funds through 141 various cryptocurrency exploits since January, putting 2022 on track to top 2021 levels of digital currency malfeasance. Comparitech’s cryptocurrency heists tracker indicates that since 2011, hackers have stolen $7.9
Our opening keynote, Marching on in 2021: Cyber Resiliency in Security , was filled with five stellar CISOs from different organizations and industry verticals: Mark Eggleston, VP, Chief Information Security and Privacy Officer at Health Partners Plans. So how can we use those tools and technologies to continue to do work?
The report reviews notable malware isolated by HP Wolf Security in the third quarter of 2021 so that security teams can better understand the threat landscape and defend their environments.
“Volt Typhoon has been active since mid-2021 and has targeted critical infrastructure organizations in Guam and elsewhere in the United States,” Microsoft said in a blog post. “In
Specialized, pure-play security companies are being bought by bigger and more generalized technology vendors or by private firms seeking to cash in on the cybersecurity boom.
A CISO or CSO should be able to look at a single screen and understand in minutes how well protected they are against potential threats. But with our Device-to-Cloud Suites, your security technology resides in one umbrella platform. Gartner Identifies Top Security and Risk Management Trends for 2021 (Gartner). Watch the Video.
Gartner’s 2021 Market Guide for XDR describes the technology as a way to integrate a wide array of different security tools — covering endpoints, network, email and so on — into a holistic picture. That’s particularly important in the case of mid-size companies where the in-house security team might not be particularly large.
Developing a Clear Cybersecurity Strategy As a CISO/CSO, creating and presenting a clear cybersecurity strategy to the board of directors is crucial in fostering awareness of cyber risks and encouraging investment in cybersecurity defense.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content