Cyber GRX senior director and CyberEdBoard executive member Peter Gregory discusses data everyone has that is an asset, but also a liability - your contact list - and how to decrease your chances of it turning toxic.
The automotive industry continues to be under pressure from cyberattacks targeting all business angles; from the parts they manufacture, to the customer data they house within connected cars and/or their processing systems.
This treasure trove of PII, IP, and critical data is attractive to nefarious groups and puts...
The banking and financial services sector is the single most important target for cybercriminals. Banks and financial institutions safeguard incredibly sensitive data of users and employees alike, and data breaches can be costly both in terms of leaked data and financial penalties incurred. Cybercriminals constantly...
Secure Email Gateways (SEGs) are highly effective at securing on-premises email environments. However, as email has
moved to the cloud, these legacy dinosaurs have been no match for the virtuosity of nimble bad actors who use emails to continually setting traps for enterprises’ employees, customers and business...
For anyone hoping to celebrate the decline and fall of ransomware by year's end, think again. While some notable operations have bowed out - at least in name - threat intelligence firm Intel 471 warns that newcomers now account for the majority of attacks, and attack volume is "still on the rise."
Getting products to market as fast as possible is essential to your company’s survival, but taking shortcuts can be very costly. Whatever stage your organization is in, it's never too late to improve your focus on data privacy and security.
As you search for the best way to balance both speed and security, here...
Multiple new attacks exploiting the explosive Apache Log4j vulnerabilities have been uncovered, including a newly discovered JavaScript WebSocket attack, threat actors injecting Monero miners via Remote Method Invocation and the comeback of an old and relatively inactive ransomware family.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including mitigating the Apache Log4j zero-day vulnerability, findings from a new report analyzing the Conti ransomware attack on Ireland's Health Services Executive and President Biden's drive to...
The latest edition of the ISMG Security Report features an analysis of the Log4j security flaw, including the risks and mitigation techniques, how to patch Log4j, and CISO Dawn Cappelli on Log4j response.
Ransomware attackers commonly bypass traditional email gateways,
targeting people directly to gain access to a company’s systems.
The answer? Replace these porous controls with a people-centric
security strategy, says Matt Cooke of Proofpoint.
Download this eBook to learn more about:
How ransomware attackers...
Security hygiene and posture management challenges are being driven by the growing attack surface due to accelerated cloud computing initiatives and cybersecurity issues. ESG surveyed 398 IT and cybersecurity professionals to get more insights into trends and how professionals are resolving issues.
From the rain forest of northern Brazil to the business hub of Sao Paulo, Marco Túlio has built an impressive career in cybersecurity. He discusses the opportunity and challenge of enabling people to step up, succeed and eventually rise to be leaders in their own right.
The new U.K cyber strategy calls for a balanced partnership across the public, private and third sectors. The government is to provide a 2.6 billion-pound investment in a more proactive approach to fostering and protecting the U.K.’s competitive advantage critical cyber technologies.
Attackers tied to China, Iran, North Korea and Turkey have been targeting or testing exploits of the ubiquitous Apache Log4j vulnerability. Vendors are rushing to identify and patch supported software and hardware as cybersecurity agencies urge organizations to mitigate the threat and beware exploit attempts.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.