This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Security and Exchange Commission (SEC) recently laid down the hammer charging and fining four prominent cybersecurity vendors for making misleading claims in connection with the SolarWinds hack. Joe Nicastro , Field CTO, Legit Security Nicastro Transparency in cybersecurity remains a complex balancing act.
Last week, CrowdStrike, one of the cybersecurity industry’s most reputable solution providers, inadvertently caused more disruption across the Internet than all the threat actors active online at the time. All companies – including cybersecurity vendors – are racing to leverage automation and AI to boost innovation, i.e. increase revenue.
Physical security is the protection of people, property, and physical assets from actions and events that could cause damage or loss. Though often overlooked in favor of cybersecurity, physical security is equally important. Get the latest from CSO by signing up for our newsletters. ]. Physical security definition.
The CEO’s email landed in Maurice Stebila’s inbox around midnight, the message asking whether Stebila, the company’s CISO at the time, had heard about the latest news-making cyber event. “He He had no idea we were already looking at this event,” Stebila says. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ]. “I
The US Cybersecurity and Infrastructure Security Agency (CISA) has designated October as Cybersecurity Awareness Month. In honor of this event, I urge you to take the month of October to become more aware of your computer and network assets. Get the latest from CSO by signing up for our newsletters. ]
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. A : Having a cyber aware culture.
Black Hat is an annual global conference of security professionals, enthusiasts and vendors, serving as a stage for innovation in the cybersecurity field. The exhibition and conference is conducted annually in locations in the US, Europe, Asia and the Middle East, with Las Vegas typically being the biggest event.
A vast majority of companies are struggling with data losses from insider events despite having dedicated insider risk management (IRM) programs in place, according to a data exposure study commissioned by Code42.
This year, the show returns as an in-person event (with a virtual component) in San Francisco after going all-virtual in 2021 due to the pandemic. Every year, global security vendors use the RSA Conference (RSAC) to exhibit new products and capabilities.
The 32 nd edition of the annual security event RSA Conference (RSAC 2022) kicks off on June 6, allowing a fresh breed of security vendors to showcase their capabilities.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Ryan Mostiller is Sr.
Top cybersecurity vendors have joined Mandiant's newly launched Cyber Alliance Program, formed to help develop integrated security systems and share threat intelligence. Mandiant is no stranger to cybersecurity partnerships. To read this article in full, please click here
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Get to know Glenn Kapetansky. Answer: Energized.
” Also read: Cybersecurity Employment in 2022: Solving the Skills Gap. My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said. “If Also read: How to Get Started in a Cybersecurity Career.
Cybersecurity pro Michaela Barnett didn’t see people like her at DEF CON and the other security industry events she attended. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ]. “We Neither did her sister, Alexandria Barnett. “We The twins set out to change that.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Well, information security, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives.
Securities and Exchange Commission (SEC) has issued new guidance aimed at clearing up confusion around how public companies should disclose cybersecurity incidents under the agency's recently adopted disclosure rules. disclosures regarding material cybersecurity incidents." of Form 8-K. Hopefully, this is a temporary and short phase!"
Other cybersecurity news. Source: The Record) SalesForce bug allows Outlook and Microsoft calendar events to be exposed. Source: CSO Online). Mozilla fixes security vulnerabilities in Firefox 94 Credit card skimmer evades Virtual Machines CISA sets two week window for patching serious vulnerabilities Wanted! Stay safe, everyone!
While last year was different because most of the events were either virtual or cancelled, this year is looking up — Black Hat is dipping its toes back into in-person events with a hybrid approach! You can always expect certain things at the height of a Las Vegas summer: sunshine, sweltering heat, and Hacker Summer Camp.
These events and many more have changed the business landscape and forced CISOs to steer a course through uncertain waters. We also saw, for the first time, a security chief sentenced to prison for concealing a data breach.
Amazon Web Services (AWS) has launched a new cybersecurity service, Amazon Security Lake, which automatically centralizes security data from cloud and on-premises sources into a purpose-built data lake in a customer’s AWS account, the company said in a statement.
Cybersecurity vendor CrowdStrike has added new AI-powered indicators of attack (IoA) functionality to its Falcon platform. In a press release , CrowdStrike stated that Falcon now allows organizations to find emerging attack techniques with IoAs created by AI models trained on real-world adversary behavior and rich threat intelligence.
The recent cybersecurity symposium that aimed to “prove” the 2020 US election was a fraud made headlines not because of evidence found, but rather the absence of evidence. As I watched the three-day event, it reminded me how unknown most of the technology behind computers is. To read this article in full, please click here
A new system recovery offering from former IBM division and current managed infrastructure service provider Kyndryl incorporates air-gapped data vaulting technology from Dell for faster recovery from major cybersecurity incidents like ransomware attacks.
In our first segment, I was joined in the Security Ledger studio by Ross and Sam Curry, a Red Team member and Chief Product and Security Officer at Cybereason to talk about the goals of the election hacking exercise and also what surprises the event held. SAP CSO Justin Somaini. October is Cybersecurity awareness month.
The decision pertains to the company's cybersecurity practices and disclosures before and after the infamous SUNBURST cyberattack. The SEC accused SolarWinds of failing to adequately disclose cybersecurity risks and vulnerabilities, which allegedly misled investors about the company's security posture and internal controls.
One of the mainstays of organizations’ digital security postures is a Security Information and Event Management (SIEM) platform. According to CSO Online , SIEMs augment threat monitoring and incident response with log analysis. The post XDR: The Key to Solving SIEM Shortcomings appeared first on Security Boulevard.
The last decade has seen its fair share of watershed moments that have had major implications on the cybersecurity landscape. Severe vulnerabilities, mass exploitations, and widespread cyberattacks have reshaped many aspects of modern security.
At that time generative AI was not a major consideration and novel privacy-preserving techniques (PPT) were not featured heavily on a CSO 5yr budgetary plan. It ensures that in the event of a cyber incident or breach, the underlying data remains protected, minimizing the risk of data leaks and ensuring compliance with both DORA and GDPR.
Plus, a recent report by the Mineta Transportation Institute doubled down on the need for C-level security and technical expertise—for instance, hiring a chief security officer (CSO) or chief information security officer (CISO). It’s also why we’ve seen cyber liability premiums rise nearly 300 to 400% over the past couple years.
As ransomware and DDoS attacks have become events that every business needs to guard against, our cybersecurity solutions have evolved to protect your organization from the latest threat actors. NETSCOUT protects digital business services against disruptions in availability, performance, and security.
To watch the full presentation, check out the event's agenda and register today. Leighton believes Russia will continue attempts to destabilize critical Ukrainian IT infrastructure; Ukraine will further exploit Russian cyber vulnerabilities; and better integration of cyber and kinetic operations by both sides will occur.
What drives cybersecurity spend and budget decisions? Security is often viewed as a cost center, necessary to keep the business afloat and to avoid costly events, but not generating profit. Too often, the reasoning behind these decisions is reactive in nature, rather than proactive.
In the modern age, war is also now publicly documented, with a constant, unmoderated stream of updates on social media taking us right to the place events are unfolding, throwing into stark relief the individual and personal impacts of war as it happens. War is one of humanity's oldest and most merciless, dehumanizing, and abhorrent acts.
Specifically, my interactions with CISOs showed me that while one CISO of a large enterprise is expanding his or her threat hunting team, another may be dealing with the more mundane challenge of patching Windows servers in time (BTW, CSO or CISO ?). We plan to hit the range of CISO interests and operational maturity levels.
Cybersecurity remains a top challenge, concern, and management focus for CIOs, CSOs and CISOs, according to CIO research. Very loosely, that’s the idea behind the Shared Signals and Events (SSE) Framework , a new standard being developed by the OpenID Foundation.
Even if you have built a fault-tolerant platform and your third parties have built strong cybersecurity programs, maybe one of those third parties is relying on a vendor that hasn’t taken the same precautions. All it takes is one major security event to demonstrate just how fragile our modern, digitally dependent society is.”
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. critical infrastructure in the event of a major crisis or conflict” with the U.S. The post Spotlight Podcast: OT Is Under Attack.
The timeline of major cyber threat events stretches back nearly four decades, but it is really only the last decade that has seen the widespread proliferation of national cyber forces. Clearly, national governments have become more willing to see cybersecurity as a key responsibility. To read this article in full, please click here
Join Ed Amoroso, CEO of TAG Cyber and Sam Curry, CSO of Cybereason as they discuss pre-COVID-19 trends, discontinuities, and the outlook based on recent events and challenges in the security industry. Supply Chain weaknesses, Ransomware, the “new normal” going forward, the evolution of the MITRE framework and more are all fair game.
New cybersecurity reporting requirements for publicly traded companies are expected to be enacted in the spring of 2023, with proposed rules from the US Securities and Exchange Commission (SEC) looking for more information and transparency from those hit with security incidents.
Poor cyber literacy is at the root of many of the cybersecurity problems plaguing the U.S. economy, according to Dr. Alissa Abdullah, Deputy CSO at MasterCard. The post At Pride Summit: A Warning On Cyber Literacy appeared first on The Security Ledger with Paul F.
Cybersecurity and Infrastructure Security Agency (CISA) recently issued a Shields Up advisory in response to the evolving Russia-Ukraine conflict. Rather, use these events as a reason to review your network and plan for future changes. Should you do anything at this time to protect your firm?
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content