This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I was reminded of this by Phil Cracknell who posted on linkedin that in his opinion the Kevin Costner, Whitney Houston classic, Bodyguard was the best infosec movie. The movie starts on the outskirts of a jungle and the CISO (Arnie) with his team land in their helicopters. Don’t believe me? Well read on.
One of the notable sessions at the SecureWorld Philadelphia conference, April 19-20, was a podcast recording featuring three prominent Philadelphia area cybersecurity experts, in a session titled, "CISOs Riff on the Latest in Cybersecurity. Glanden serves up the specialty cocktail of the day, the "CISO." Give it a listen.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison appeared first on The Security Ledger with Paul F. Dustin Hutchison is CISO at Pondurance. Click the icon below to listen.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson appeared first on The Security Ledger with Paul F. Dustin Hutchinson is CISO at Pondurance. Click the icon below to listen.
As we head into the unofficial start of summer, it does not appear the criminal groups that run ransomware schemes are planning to take any time to rest. Ransomware was all over the infosec news headlines in the past week, with one new report revealing that its presence has grown more in the last year than in the past several years combined.
Joseph Carson, chief security scientist and advisory CISO at ThycoticCentrify, offers advice on least privilege, automation, application control and more.
With ransomware running rampant, cybercriminals operating complex schemes, and nation-state threat actors like Russia becoming more aggressive, it can sometimes feel like there is no end in sight. Here are some of the most amusing ones InfoSec memes we've seen. Working in cybersecurity can be awfully stressful these days.
Last week on Malwarebytes Labs, we looked at which age range is most likely to be targeted by online predators , talked to Malwarebytes CISO John Donovan on our Lock and Code podcast , and explored the latest deepfake happenings. There were also fines for cities , and a 101 guide to Smishing. Other cybersecurity news.
While in past years, InfoSec was previously the focus and CISOs were the norm – we’re moving to a new cybersecurity world order that expands the role of the CISO to a CSO (Chief Security Officer). Ransomware becomes the most feared adversary.
The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. Stay abreast of: Current trends such as Zero Trust, Cloud Security, IoT Security, Ransomware, Supply Chain Security, BYOD / Mobile Security, etc. This greatly increases the attack surface for enterprises.
I think it requires taking a step back and assessing what you can do with less," said Chris Roberts, CISO and Senior Director at Boom Supersonic. Andrew Smeaton, CISO at Afiniti, says reassessment of cybersecurity programs and plans is necessary. Too many folks focus on the technology as opposed to the people or process.
That was the case for a broadcast SecureWorld recently hosted with Mike Britton, CISO of Abnormal Security , and legendary investigative journalist Brian Krebs. Key takeaway #3: Social engineering is the most powerful attack vector against InfoSec protocols. And you know, that can cause a potential loss for that organization.".
5 Trends to Watch for Cybersecurity in 2023 – "From advancements in artificial intelligence (AI) to the continued evolution of ransomware and cyberattacks, the coming year is sure to bring significant developments in the world of cybersecurity. As we turn toward 2023, these will be the top ten challenges facing CISOs in the new year.".
A common perception in the infosec community is that there can never be too much security, but it is understood that “too much” security is expensive — and sometimes, prohibitively so — from a business perspective.
. » Related Stories Episode 216: Signed, Sealed and Delivered: The Future of Supply Chain Security Episode 215-2: Leave the Gun, Take the McFlurry Episode 214: Darkside Down: What The Colonial Attack Means For The Future of Ransomware. Infosec is one of the most demographically lopsided industries around in terms of gender.
Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily social engineering attacks and extorting businesses large and small with ransomware. To achieve more resilience in this heightened risk environment, stepping up zero trust maturity is essential.
Ransomware was more pervasive and more disastrous than ever before. CISOs and infosec professionals are finally getting a seat at the table at an executive and board level. I’ve been in infosec for over 30 years and have had the great privilege of evolving and learning as a cybersecurity executive in a space I love.
commercial and casualty insurance companies, reportedly met a $40 million ransom demand after suffering a ransomware infection earlier in the year. As of this writing, that’s the largest ransom demand ever reported to have been paid by a company following a ransomware attack. CNA, one of the largest U.S.
Ransomware was the number one contributor to stress levels, with 38% admitting their organization had paid a ransom, 46% claiming their data was still exposed by threat actors, and 44% being unable to restore their data, even after the ransom was paid. Ransomware threats (48%). Digital transformation impacting security posture (51%).
In the past, fake social profiles were relatively easy to spot, however in the case of DPRK, the cybercriminals spent time to setting up a profile, get hooked up into the infosec scene, gain followers and connections through LinkedIn, making it more difficult than before to detect a fraudulent account. Techniques & Tactics.
By the time I arrived at my desk, companies around the world were shut down by the same attack--which Symantec declared as Petya ransomware. Within about an hour, a Danish power supplier was also knocked offline and Maersk shipping announced that it was affected as well. It was going to be a busy and interesting day. .
Propelled by the surge of cyber incidents and ransomware attacks, businesses and insurance providers are rethinking and redefining how they engage each other, said Trent Cooksley, chief operation officer at Cowbell Cyber. “In It could very well drive companies and certain industries like finance or health care to have a common standard.”.
Today, malicious actors from cybercriminal ransomware gangs to nation-state affiliated hacking groups are teeing up vulnerable operational technology (OT) environments. Video Podcast ] | [ MP3 ] | [ Transcript ] Cyber attacks on critical infrastructure have gone, in the past two decades from the hypothetical, to the actual, to the epidemic.
Other prominent security incidents in 2020 included the Twitter compromise, and ransomware attacks on hospitals. In the words of Duo Security’s Head of Advisory CISOs Wendy Nather, “This is not a marketing report to toss in your swag bag and ignore …this report will change how we think about running infosec programs.”
We constantly see new threats, and threat vectors, come and go; which puts a tremendous strain on the InfoSec teams that have to protect organizations and businesses from these threats. This year we saw the reemergence of old vectors: from ransomware & trojans, to supply chain attacks. Read more here.
Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. As an entry point for major ransomware and fraud, BEC also contributes to supply chain compromise incidents. Zero Trust has come of age. With tailwinds such as the U.S.
How CIOs Can Protect Data Against Ransomware Attacks in 2022. Here are 4 ways to protect your organization’s most precious asset—data—against the ransomware pandemic. Ransomware has become one of the most dangerous and high-profile problems facing CIOs and CISOs worldwide. Wed, 10/27/2021 - 08:34. Hims Pawar.
The year may have changed but ransomware shows no signs of slowing. Symantec discovered a new ransomware strain in the wild, called TISAK. Meanwhile Wired named two ransomware gangs, Alphv and CIOp, among its ‘most dangerous people 2023’ list. its central thesis calls for a ban on ransomware payments.
Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. 2023 cybersecurity issues will continue: Weak IT fundamentals, poor cybersecurity awareness, and ransomware will still cause problems and make headlines.
We have seen firsthand that it takes more than an individual task force to combat ransomware and other related threats such as phishing, insider threats and more. Ransomware-as-a-service (RaaS) will continue to grow and become more sophisticated over the next year. Tyler Farrar, CISO, Exabeam.
The SolarWinds supply chain attack, escalating ransomware incidents, and the ProxyLogon Microsoft Exchange exploits only further compounded matters. And that’s why it’s so important to be able to communicate with individuals who truly understand an infosec insider’s point of view. based group. “We How are you really doing?’”
As wake up calls go, the Colonial Pipeline ransomware hack was piercing. This very high-profile caper is part of an extended surge of ransomware attacks, which quintupled globally between the first quarter of 2018 and the fourth quarter of 2020, and is expected to rise 20 percent to 40 percent this year, according to insurance giant Aon.
Vamos i I realized this isn't the typical InfoSec opening for The Hacker Mind but it is an important backstory for this episode's guest. They can go out and one website and buy credentials, they get on a network, and they can want another one to ransomware as a service provider. Ransomware he won't attack right?
This month, we interviewed Esmond Kane, CISO of Steward Health Care. First of all, while I am honoured and deeply thankful for the recognition, I believe strongly that Security is a team effort and I must acknowledge the superb InfoSec team in Steward but also the Steward workforce. Esmond Kane is Cisco’s CISO of the month.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content