article thumbnail

Fintech Giant Finastra Investigating Data Breach

Krebs on Security

” “Additionally, we have been sharing Indicators of Compromise (IOCs) and our CISO has been speaking directly with our customers’ security teams to provide updates on the investigation and our eDiscovery process,” the statement continues. 8 post on BreachForums. Image: Ke-la.com. 3, that price had been reduced to $10,000.

article thumbnail

Why CISO roles require business and technology savvy

CSO Magazine

Of all the crazy postings that advertise for CISO jobs, the one asking for a CISO to code in Python was probably the most outrageous example of the disconnect about a CISO’s role, says Joe Head, CISO search director at UK-based search firm, Intaso. To read this article in full, please click here

CISO 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISOs should put ad fraud security on their radars

Tech Republic Security

Digital advertising has vulnerabilities, and this type of cybercrime will cost businesses $100 million a day by 2023, but goes almost completely unnoticed, according to adtech company TrafficGuard.

CISO 178
article thumbnail

Security Affairs newsletter Round 494 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA adds Fortinet products and Ivanti CSA bugs to its Known Exploited Vulnerabilities catalog Nation-state actor exploited three Ivanti CSA zero-days Dutch police dismantled dual dark web market ‘Bohemia/Cannabia’ macOS HM Surf flaw in TCC allows bypass Safari privacy settings Iran-linked actors target critical infrastructure organizations (..)

article thumbnail

Are CISOs of Security Vendors in Your Community?

Lenny Zeltser

Unfortunately, some events and communities exclude CISOs who work for security vendors. CISOs of All Types Industry veteran Andrew Hay once posted a tongue-in-cheek "CISO hierarchy of industry respect." Further down were CISOs at financial services or insurance firms. Lower, the CISOs at hardware vendors.

CISO 56
article thumbnail

Hackers are scanning the web for vulnerable Citrix systems

Security Affairs

Citrix CISO, Fermin J. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->. For this reason, Citrix believes the flaws are less likely to be exploited. Pierluigi Paganini. SecurityAffairs – hacking, CITRIX).

article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

So we’ve got to rethink things, and I think the Department of Defense and Department of Homeland Security and [Federal CISO] Chris DeRusha came out and reaffirmed a zero trust strategy, which I’ve been advocating for for the last five years. We’ve drilled holes in with VPNs, which are…25-year-old technology.

CISO 109