In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the role of cyber insurers in supporting ransomware victims' incident response, and how to build a successful bug bounty program.
FBI Director Christopher Wray faced questions during a Senate hearing Tuesday concerning a published report that the bureau for almost three weeks withheld a decryption key that agents obtained from the ransomware gang that targeted software firm Kaseya.
With automotive standard ISO 21434 just around the corner, this tutorial focuses on how it will form a key protective component against the cyber threats facing automation software developers.
Like his peer CISOs, Amit Basu of International Seaways is concerned about complexity and the shifting landscape. But not just the threat landscape - he also is challenged by the shifting dynamics of business priorities and processes, as well as what "protection" in this new environment now entails.
Medical ethics can no longer be separated from cybersecurity in healthcare as we need to think of cyberattacks in the context of clinical outcomes, says Christopher Frenz, information security officer at Mount Sinai South Nassau, a medical care provider.
Score one for the good guys in the fight against ransomware: Anyone who fell victim to REvil, aka Sodinokibi, crypto-locking malware before July 13 can now decrypt their files for free, thanks to a decryptor released by security firm Bitdefender.
Amid digital transformation initiatives, the application shift to the cloud has been happening at a historic pace. James Brotsos of Checkmarx and James Ferguson of AWS discuss what this shift means for securing cloud DevOps and what each of their organizations brings to their partnership.
During the early part of his career, Dr. Ram Kumar G, a cybersecurity veteran, decided to join a company that was not part of the IT industry. He shares the challenges he faced and discusses the importance of risk-taking.
Building and running cloud-native services unlock breakthroughs in speed and new innovation, but they add complexity to both infrastructure and application architecture. Observability, when done right, helps your SRE and development teams cut through that complexity to react quickly to problems and continuously...
Cloud-based services are affecting governance, risk management and compliance practices in Australia, says Tim Nedyalkov, who is a technology information security officer with Commonwealth Bank. He discusses the differences between how managers and practitioners approach the problems.
Tammy Klotz took on a new job at a new company and even in a new state in 2020 - and she was charged with both establishing herself and raising the firm's cybersecurity posture. No challenge during a global pandemic, right? Here is how she has begun to pave her way.
A pair of House committees this week said they want to spend additional millions on cybersecurity by injecting funds into CISA and the FTC, as part of the debate over the Biden administration's $3.5 trillion budget proposal for 2022. Part of the money would help fulfill Biden's executive order.
Travis CI, a Berlin-based continuous integration testing vendor, has patched a serious flaw that exposed signing keys, API keys and access credentials, potentially putting thousands of organizations at risk. Those using Travis CI should change their secrets immediately.
Thought leadership is crucial within the threat intelligence sharing community and developing technologies that easily share and use threat intelligence, as a nation we can help agencies identify and stop attacks aggressively and quickly.
During the podcast, you can anticipate a healthy discussion on:
The value of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.