This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Related: Technology and justice systems The U.S. Security and Exchange Commission (SEC) recently laid down the hammer charging and fining four prominent cybersecurity vendors for making misleading claims in connection with the SolarWinds hack. SEC investigators gathered evidence that Unisys Corp.,
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.
CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. NERC) standards.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. For Hacking.
Case in point: A federal judge recently ordered Uber Technologies to work with its former CSO, Joseph Sullivan (who held the position from April 2015 to November 2017), and review a plethora of Uber documents that Sullivan has requested in unredacted form for use in his defense in the upcoming criminal trial.
Everybody worries about hacked voting machines. In this week’s podcast (#113): Everybody worries about hacked voting machines. A shadowy hacking group calling itself the “Broken Eagle Task Force” (or BETF) is protesting the ‘global order,’ and looking to disrupt voting within the city’s environs. SAP CSO Justin Somaini.
Ethical hacking, also known as penetration testing , is legally breaking into computers and devices to test an organization's defenses. You are literally getting paid to keep up with the latest technology and get to break into computers without the threat of being arrested.
Another top goal for malicious hacks on transit agencies is getting a ransom paid. Plus, a recent report by the Mineta Transportation Institute doubled down on the need for C-level security and technical expertise—for instance, hiring a chief security officer (CSO) or chief information security officer (CISO).
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. appeared first on The Security Ledger with Paul F. Click the icon below to listen.
Jeff Moss, ICANN CSO and founder of DEF CON/Black Hat, gave the keynote speech at SecTor 2021 in Toronto, Ontario. His talk was nostalgic, reflecting on the 40+ years of computer hacking. Moss also said that all hacking is not infosec and that all infosec is not hacking. But hacking, not so much. It’s a job.
In a new report this week, Microsoft warns that since May, the group known as Nobelium has targeted over 140 cloud service resellers and technology providers and has succeeded to compromise as many as 14. Nobelium, also known as APT29 or Cozy Bear, is considered the hacking arm of Russia's foreign intelligence service, the SVR.
Deploying the latest, greatest detection technology to deter stealthy network intruders will take companies only so far. I had the chance to sit down with Kris Lahiri, CSO and co-founder of Egnyte , one of the original EFSS market leaders. The wisdom of proactively purging stored data was driven home by the hack of Capital One bank.
The SolarWinds hack brought the need for federal mandates on third-party vendors and suppliers to light in an unprecedented way. James Carder, CSO, LogRhythm. In March 2021, President Biden signed the $1.9 Achieve Compliance and Data Privacy Regulation Standardization at the Federal Level.
Glenn Kapetansky, Chief Security Officer and Technology Capability Lead for Trexin Consulting, has a passion for building systems, organizations, and teams, and has done so across a number of business sectors, technologies, and roles. Fun fact: my six years as CSO of Trexin is my first official full-time security role!
A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Such revelations create intrigue as to whether a more insidious actor could perform a similar hack in order to conduct industrial espionage by spying on development and production activity.
This was how the Sony Pictures ransomware hack also took place in late 2014 and since. We need to take user protection seriously, change the security paradigm, by studying and building protections around people and processes, rather than solely focusing on technology. The call was largely ignored as were the solutions.
By Amanda Fennell, CSO and CIO, Relativity. In certain circumstances, anyone, even a security professional, can be hacked. Amanda joined the Relativity team in 2018 as CSO and her responsibilities expanded to include the role of CIO in 2021. But tools and processes alone are two variables in an incomplete equation.
Watch the on-demand webinar , in which Phillip Hayes, Tenables Director of Information Security, and Michael Garman, Tenables Senior Manager of Technology Engineering, discuss a variety of cloud security best practices. Financially motivated cyber intrusions, even those without any ties to state goals, harm national security.
Sonatype’s world-class open source intelligence, which includes our automated malware detection technology, safeguards your developers, customers, and software supply chains from infections like these. SecurityAffairs – hacking, CursedGrabber malware). Pierluigi Paganini.
These evils include hacking, identity theft, online surveillance, and cyberstalking. We all know the dangers associated with hacking, identity theft, and internet surveillance, thanks to Facebook and other social networking platforms. Similarly, these hackers can hack your devices too.
Workforce challenges persist, with states finding it difficult to hire and retain professionals who understand AI technologies and their security implications. State CISOs may want to explore the possibility of relationships with the private sector that can offer early warnings of viruses or hacking trends.
Former Uber CSO Joe Sullivan was found guilty of obstructing a federal investigation in connection with the attempted cover-up of a 2016 hack at Uber, NIST and Microsoft say that mandatory password expiration is no longer needed but many organizations are still doing it, and how fake executive profiles are becoming a huge problem for […].
A new report out Tuesday by Hack The Box has found that enterprises are losing approximately $626 million in lost productivity due to security practitioners feeling the squeeze on their mental health. It also cites the emergence of recent technologies, and the proliferation of criminal groups, as issues increasing pressure on staff.
Also joining us: Sam Curry, the CSO of Cybereason. As Election Threats Mount, Voting Machine Hacks are a Distraction. Securing an election that takes place over weeks or even months across tens of thousands cities and towns – each using a different mix of technology and process – may be an impossible task.
These days, information technology (IT) and information security professionals know this all too well, especially when it comes to configuration assessments. The 2020 Verizon Data Breach Investigations Report (DBIR) notes that vulnerabilities accounted for nearly 20% of hacking breaches.
Comparitech’s cryptocurrency heists tracker indicates that since 2011, hackers have stolen $7.9 billion in cryptocurrency worth about $45.5 billion in today’s value.
CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few). It is a common feeling in the cybersecurity community that CISOs do not sleep well at night.
Kathleen Moriarty, Chief Technology Officer : “The state of cyber threats is such that we need to pivot to built-in security models. explains the top attack types: Malware, Ransomware, Web Application Hacking, Insider Privilege and Misuse, and Targeted Intrusions.”. Cyber Threats That Frighten Even The Experts.
And, in our second segment, Sam Bisbee the CSO of the firm ThreatStack joins us to talk about last month's hack of the PEAR open source package manager and why data deserialization attacks are a growing threat to projects that use open source components. Vijay Balasubramaniyan of Pindrop joins us to talk about it.
Many users and organizations are struggling to keep pace with the education and training needed to comprehensively understand and protect these technologies. In 2025, CISOs will be challenged to strike a balance between driving forward technological adoption and ensuring the security and resilience of these tools.
Thanks in part to the harsh publicity and severe damage caused by state-sponsored hacks that day is finally in sight. A CISO or CSO should be able to look at a single screen and understand in minutes how well protected they are against potential threats. Consolidation is intended to remove headaches rather than create them.
That’s why Tennisha Martin founded Black Girls Hack , an organization designed to help the next generation receive the skills and experience they need to land jobs in the C-suites, and perhaps begin to address the acute shortage of infosec professionals with qualified people of color. For many, though, that isn’t true.
That’s why Tennisha Martin founded Black Girls Hack , an organization designed to help the next generation receive the skills and experience they need to land jobs in the C-suites, and perhaps begin to address the acute shortage of infosec professionals with qualified people of color. For many, though, that isn’t true.
Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012. Attacks now extend beyond data leaks and can have far reaching business disruptions across an entire supply chain.
In this conversation, I talk with Boyd about Kry10’s technology and the challenge of securing the modern IoT and how the challenges of managing modern, connected devices demands new tools and platforms for securing those devices. Related Stories Episode 250: Window Snyder of Thistle on Making IoT Security Easy Forget the IoT.
“Certifications range from penetration testers , government/industry regulatory compliance , ethical hacking , to industry knowledge,” he said. My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said.
The technology “tears at the heart of privacy of individual citizens” but is also fallible and could be evaded by those meant to be targeted, and misused, they added. . According to CSO Online , VPNs have a lot of shortcomings for handling remote network connections. VPNs, TTFN? Trend Micro has you covered.
She’s an amazing person who has done an amazing number of things in a short amount of time -- CMU professor, Forrester analyst, CSO at a successful startup -- and she’s not done changing the industry. It’s about challenging our expectations about the people who hack for a living. That is, until Chenxi Wang spoke up.
The contemporary world has witnessed the rise of the Internet and global communication, and collaboration technologies, including mobile data use and the culture of bring your own device [BYOD]. Today, c yber security incidents lead to significant damage, alarming organizations of all types and sizes in different geographic locations.
SolarWinds redux In many ways, CrowdStrike was a repeat of the SolarWinds supply chain hack. With this in mind, Last Watchdog sought commentary from technology thought leaders about what the CrowdStrike outage says about the state of digital resiliency.
1 - Securing OT/ICS in critical infrastructure with zero trust As their operational technology (OT) computing environments become more digitized, converged with IT systems and cloud-based, critical infrastructure organizations should beef up their cybersecurity by adopting zero trust principles. national security.
Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. Brian Krebs | @briankrebs. — Dave Kennedy (@HackingDave) July 15, 2020.
According to PwC, more than half (55%) of technology and security executives plan to increase security budgets in 2021. A survey from Enterprise Technology Research (ETR) revealed that IT decision-makers expect permanent remote work to double in 2021. James Carder, LogRhythm CSO. Recent Attacks are Inspiring Change and Action.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content