Days ago, the Ukrainian Ministry of Defense issued a call for Ukrainian hackers to safeguard its networks and tap into Russian infrastructure. Now, Mykhailo Fedorov, Ukraine's vice prime minister and minister of digital transformation, says he is creating an IT army and calling for digital talents.
Since 2019, the Global Cyber Alliance has been using a custom IoT honeypot solution that identifies global attack risks and collects data about IoT attacks. Leslie Daigle discusses its findings about how threats have evolved and offers advice on how to better secure IoT devices and tech.
Gaps in federal regulations concerning the security and privacy of health data falling outside HIPAA's umbrella are getting filled to some extent by various state laws. But that's creating additional challenges, says privacy attorney Kirk Nahra of the law firm WilmerHale.
Anyone trying to make sense of data breach trends faces a transparency challenge. Too often, a lack of detail undercuts consumers' ability to assess their identity theft risk and businesses' ability to block emerging attacks or ensure that their supply chains remain secure.
CISA and the FBI issued a joint advisory pointing to Russian state-sponsored activity using WhisperGate and HermeticWiper malware to target Ukrainian organizations. CISA also updated the Shields Up webpage to include new recommendations for corporate leaders and actions to protect critical assets.
As the Russian invasion of Ukraine escalates, organizations in the U.S. and Western Europe wonder: What is the potential blowback if the U.S. strikes back at Russia? Sam Curry, veteran CSO of Cybereason, reviews the possibilities and advises about how best to approach risk and preparedness.
Grant Schneider of Venable and three ISMG editors discuss preparedness, response and resilience in light of the Ukraine-Russia crisis; the White House and allies’ efforts to counter ransomware; and future guidance to expect from the Biden administration's cybersecurity executive order.
As Russia has invaded Ukraine, the likelihood of nation-state cyberattacks continue to escalate, and banks remain a top target. On this week's "Sound Off," David Pollino, the former CISO of PNC Bank, discusses how financial institutions should - and must - strengthen their incident response plans.
As fresh wiper malware attacks target Ukrainian government and financial services organizations and contractors, security experts are urging organizations outside the country to avoid catastrophizing and stay focused on maintaining basic, essential cybersecurity defenses.
Many security practitioners take a check-box approach to cybersecurity, which prevents them from seeing the whole system. John Remo of Warner Music Group discusses how to break out of this pattern and use critical and abstract thinking to examine the deeper workings of the system.
Older consumers are considered a more vulnerable population. They are the best kind of customers, and cybercriminals know that. They are known for having better credit and more funds, tend to be more trusting, and lack familiarity with new digital technologies. Fortunately, there is a way to help financial...
NBC News reports that President Joe Biden has been given a menu of options for conducting offensive cyber strikes again Russia. But the White House's press secretary says the report is "off base and does not reflect what is actually being discussed in any shape or form."
By baselining cyber maturity, one can create an organization's risk profile - and that is the key to being able to build a road map for prioritizing and addressing business risk. ISACA's Brian Fletcher shares insights on establishing the maturity goals for one's unique organization.
Zero trust, identity-first and perimeter-less security - they all need digital identities to establish digital trust. Join Sectigo's CSO and former Gartner analyst David Mahdi to learn about the importance of identity-first security and establishing digital trust for human and machine identities.
The ISMG Security Report analyzes the latest updates on the Ukraine-Russia crisis and offers cyber resiliency tips for organizations. It also describes how the Conti ransomware group has hired TrickBot malware developers and revisits one of the largest ransomware attacks ever in the U.S.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.