Ransomware attackers commonly bypass traditional email gateways, targeting people directly to gain access to a company's systems. The answer? Replace these porous controls with a people-centric security strategy, says Matt Cooke of Proofpoint.
The findings from a penetration test can help you identify risks and gaps in your security controls. Charles Gillman offers tips to maximize the value of your next pen test and, in the process, deliver better results.
On the heels of supply chain attacks, critical infrastructure hits and ransomware gone wild, what more can we expect from cyber attackers in 2022? Plenty, says Derek Manky of Fortinet's FortiGuard Labs. He details his New Year predictions.
Though there has been a decrease in expense fraud, vendor collusion fraud has seen a significant increase this year, says Bethmara Kessler, faculty member at the Association of Certified Fraud Examiners, or ACFE.
Chinese threat actors may increasingly look to steal sensitive, encrypted data in hopes of decrypting it with quantum computing technology in the years ahead, according to a new report. Researchers say Chinese threat actors may target government, business and academic data with long-term value.
COVID-19 deaths are down in some parts of the U.S., but infection rates are up. What does this mean as the nation kicks off its holiday season with Thanksgiving? Pandemic expert Regina Phelps shares insight on how to approach the holidays and what it will take to attain an endemic state.
The U.S. government warns all businesses that they're at elevated risk of online attacks during Thanksgiving, given attackers' proclivity to strike on weekends and holidays. The alert is a reminder of the importance of having in place well-practiced incident response plans. Here's where to start.
A new report by Huawei Technologies USA and Reuters calls for greater international collaboration around transparency and cyber accountability. "Just having requirements isn't good enough. There needs to be an ability to tell whether or not the requirements are being met," says CSO Andy Purdy.
Drawing on his deep background in technology, government and law, cybersecurity adviser Tony Scott delves into many pressing issues in cybersecurity today - including zero trust. In this episode of "Cybersecurity Unplugged," he says organizations should get started on the journey now.
Many healthcare entities are resistant to implement multifactor authentication, and that is among the most frustrating critical security mistakes that organizations in that sector make, says Tom Walsh, founder of security consultancy tw-Security.
"Garbage in, garbage out." That's a fundamental problem with traditional application security management, which lacks both context and automation. But Idan Plotnik, co-founder and CEO of Apiiro, proposes a new approach to application risk management.
Whether on-premises or in the cloud, secure backups are a necessity. Sam Nicholls and David Hill of Veeam Software discuss backups, the shared responsibility model and IAM considerations for enterprises during their cloud migrations.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the status of the recommendations of the Cyberspace Solarium Commission today and what still needs to be enacted by the current Congress, addressing the increasing challenge of cyberattacks...
We know they are coming, and yet we are still ill-prepared. Cybereason surveyed 1,200 global cybersecurity professionals on ransomware. And while most are concerned about attacks, nearly one-quarter have no contingencies for weekends and holidays - the favored strike time. Sam Curry explains why.
This is the second episode of "The Ransomware Files," a podcast miniseries focused on stories of resilience in the fight against ransomware. An Australian company, Matthews, saw its backups corrupted and attackers release its data. The company recovered however, and has greatly improved its IT security defenses.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.