As director of security for a telecom company, Ian Keller works to ensure customers have the latest knowledge and intelligence required to deploy the company's products in a secure and compliant manner.
Khwaja Mohammad Ali of the Federal Bank of Pakistan explains why cyberattack prevention requires collaboration between tech teams and senior management.
Ransomware attacks are stuck on repeat: Criminal syndicates have found an extremely profitable business model, and they're milking it for all it's worth. So give the city of Tulsa, Oklahoma, credit for having in place robust disaster recovery capabilities and vowing to remediate, rather than pay criminals.
Four editors at Information Security Media Group discuss tactics for improving hiring practices and increasing workforce diversity as well as achieving sustainable resiliency.
It's not just traditional data governance – it's about business risk. And in the age of GDPR and CCPA, you’d best have a handle on data discovery and classification. Patrick Benoit of CBRE gives the BISO's perspective on data risk governance.
5G technology reminds us that, globally, our sensitive data is open to attack. Janine Darling, founder and CEO of STASH Secure Data, is committed to resolving that vulnerability challenge.
You can see it in the latest high-profile attacks: Security requirements are ever more complex, exceeding the capacity of current protection capabilities. Enterprises need a new strategy for defending entry points, and Tom Sego of BlastWave believes he has it.
A week after Ireland's health services provider was hit by a ransomware attack, the Conti gang has provided a decryptor, which officials are now testing to determine whether to use it, Reuters reports. But the gang is still threatening to release stolen data unless a $19 million ransom is paid.
Although many companies are deploying extended detection and response, or XDR, their efforts often are coming up short, says Richard Stiennon, chief research analyst at IT-Harvest.
"They’re playing games," is how one security expert describes Conti ransomware-wielding attackers' "gift" of a decryptor to Ireland's crypto-locked health service, while still demanding a ransom to not leak stolen health data. The same could be said of the DarkSide gang's promised retirement.
As a global CISO and privacy officer, Rebecca Wynn has earned her stripes. And she's upfront with her expectations: She will take your security organization to the next level. But she also won't hesitate to walk away if she sees that cybersecurity commitment is nothing but talk.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.