By baselining cyber maturity, one can create an organization's risk profile - and that is the key to being able to build a road map for prioritizing and addressing business risk. ISACA's Brian Fletcher shares insights on establishing the maturity goals for one's unique organization.
"Shadow data" - it's the new "shadow IT," and it puts your enterprise data at potential risk in public cloud environments. Amit Shaked, CEO and co-founder of Laminar, defines the risk, explains the threat and describes how best to mitigate it.
The ISMG Security Report analyzes the latest updates on the Ukraine-Russia crisis and offers cyber resiliency tips for organizations. It also describes how the Conti ransomware group has hired TrickBot malware developers and revisits one of the largest ransomware attacks ever in the U.S.
The Ukrainian cyber police have arrested five individuals charged with stealing credit card data from at least 70,000 people, using 40 separate phishing sites. The losses from the attack are reported to amount to more than $172,656.
With a Russian invasion of Ukrainian territory now ensuing, Ukraine's network defenders say they've prepared to safeguard critical assets, which are now centrally stored in its capital, Kyiv. Only time will tell whether Russian troops advance toward the city.
In the latest "Proof of Concept," Grant Schneider, senior director of cybersecurity services at the law firm Venable, and Ari Redbord, head of legal and government affairs at TRM Labs, join editors at Information Security Media Group to discuss trending cybersecurity issues.
The "weaponization of data" in cyberattacks - where cybercriminals not only deploy ransomware but threaten to release stolen data on the internet - has quickly become one of the biggest threats facing many healthcare sector entities, says Adam Meyers of CrowdStrike.
As Russia's invasion of Ukraine continues, what will happen next remains unclear. Accordingly, cybersecurity experts are again calling on organizations globally to focus on what they can control, including their cybersecurity defenses and business resiliency preparedness.
Xenomorph, a new banking Trojan that appears to be linked to the nasty Alien malware family and has been downloaded more than 50,000 times in the Google Play Store, has been targeting European banks. But ThreatFabric research shows that overlay attacks more frequently target cryptocurrency wallets.
Following recovery of $22.25 million in cryptocurrency on USB sticks and in an "online safe," 23 victims of a cryptocurrency scam have received $5.4 million that was stolen from them, according to the U.K. Greater Manchester Police.
Hacking incidents still dominate the major health data breaches being reported to the U.S. Department of Health and Human Services in the first months of 2022 by far, with only one other type of breach appearing on the federal tally so far this year. Are organizations missing other breaches?
The EU confirmed that it will activate its elite cybersecurity team to assist Ukrainians if Russian cyberattacks occur. The news follows rapid escalation in the Russia-Ukraine border conflict, where Russia has amassed over 100,000 troops and is reportedly considering full-scale invasion.
On this week's "Sound Off," attorney Lisa Sotto demonstrates how Colonial Pipeline did "a lot right" in its response to the DarkSide ransomware attack that led the firm to shut down operations for nearly a week last May. She shares best practices for enterprises to improve incident response plans.
In 2019, 23 cities across Texas were struck by one of the largest ransomware attacks ever in the U.S. The attack, which involved the REvil ransomware, started with a compromised managed service provider. While the cities recovered quickly, the MSP sustained irreparable damage.
In 2021, there was a spike in cybercrime, and the focus changed for threat actors from several countries, particularly Russia and China. Cybersecurity firm CrowdStrike provides an overview of the changes, analyzes the takedown of Russian threat actor REvil and adds to its list of adversaries.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.