The ISMG Security Report analyzes the latest updates on the Ukraine-Russia crisis and offers cyber resiliency tips for organizations. It also describes how the Conti ransomware group has hired TrickBot malware developers and revisits one of the largest ransomware attacks ever in the U.S.
With a Russian invasion of Ukrainian territory now ensuing, Ukraine's network defenders say they've prepared to safeguard critical assets, which are now centrally stored in its capital, Kyiv. Only time will tell whether Russian troops advance toward the city.
In the latest "Proof of Concept," Grant Schneider, senior director of cybersecurity services at the law firm Venable, and Ari Redbord, head of legal and government affairs at TRM Labs, join editors at Information Security Media Group to discuss trending cybersecurity issues.
Cybersecurity has the board's attention these days - the daily headlines assure that. But how does a security leader keep that attention and also win over other key stakeholders in the enterprise? Kelly Hood shares guidance rooted in ISACA's CMMI Cybermaturity Platform.
The "weaponization of data" in cyberattacks - where cybercriminals not only deploy ransomware but threaten to release stolen data on the internet - has quickly become one of the biggest threats facing many healthcare sector entities, says Adam Meyers of CrowdStrike.
As Russia's invasion of Ukraine continues, what will happen next remains unclear. Accordingly, cybersecurity experts are again calling on organizations globally to focus on what they can control, including their cybersecurity defenses and business resiliency preparedness.
The EU confirmed that it will activate its elite cybersecurity team to assist Ukrainians if Russian cyberattacks occur. The news follows rapid escalation in the Russia-Ukraine border conflict, where Russia has amassed over 100,000 troops and is reportedly considering full-scale invasion.
On this week's "Sound Off," attorney Lisa Sotto demonstrates how Colonial Pipeline did "a lot right" in its response to the DarkSide ransomware attack that led the firm to shut down operations for nearly a week last May. She shares best practices for enterprises to improve incident response plans.
In the wake of the great digital transformation, cybersecurity is more important than ever - and so is cyber maturity. Kelly Hood of Optic Cyber Solutions and Brian Fletcher of ISACA talk about the pillars of cyber maturity and how to embrace them via the CMMI Cybermaturity Platform.
In 2021, there was a spike in cybercrime, and the focus changed for threat actors from several countries, particularly Russia and China. Cybersecurity firm CrowdStrike provides an overview of the changes, analyzes the takedown of Russian threat actor REvil and adds to its list of adversaries.
Employees with too much access can pose an insider threat. When employees have access to more than they need to do their job, there are more opportunities for mistakes, whether accidental or not. Lack of accountability means you
don’t know who did what, when. If too many people have the same level of access and...
Remote work presents many opportunities for businesses, but also has its challenges: How do you maintain security
throughout the business? How do you ensure employees have access to the resources they need to stay productive? Remote work doesn't need to be a challenge with the right password security in place.
...
In the latest weekly update, four ISMG editors discuss how ransomware attacks got worse in 2021, the backlash from privacy experts sparked by the IRS' decision - now changed - to use facial recognition technology on American taxpayers, and why cybersecurity fosters competitive advantage.
CISA, FBI and NSA issued a joint advisory on Wednesday pointing to Russian state-sponsored activity against defense contractors. Officials say they have tracked threat actors compromising cleared defense contractors supporting several branches of the U.S. military and the intelligence community.
By almost every measure, ransomware continues to get worse, not least in the average amount criminals receive when a victim chooses to pay a ransom. So say new reports assessing the volume and severity of ransomware attacks, the flow of cryptocurrency, attackers' target selection and more.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.