The U.S. is on "borrowed time" for a major cyberattack that could potentially seriously disrupt critical infrastructure, but the nation can secure its systems and resources to avoid such cybersecurity disasters, says Rep. Eric Swalwell, D-California.
Abnormal Security is out with new financial crimes research, and it shows that traditional business email compromise is evolving into new forms of financial supply chain compromise. Crane Hassold shares insights on the crimes and how best to detect, deter and respond to them.
Cyberwarfare has emerged as the bridge between espionage and kinetic conflict. "It's here," says Chase Cunningham of Ericom Software. He discusses how enterprise cybersecurity leaders should now think more deeply about their adversaries' motivations and capabilities.
Far too many companies think that backups and cyber insurance will see them through a cybersecurity breach, says Mark Sangster of Adlumin. He shares his advice to enterprise security leaders who want to treat cybersecurity as the business risk it is.
From cloud migration to application development, cybersecurity is in the middle of an "epochal change," says Jeff Hudson, CEO of Venafi. He wants enterprise security leaders to envision the possibilities when security and development are in sync.
The Cyber Threat Alliance just celebrated its fifth birthday, and President and CEO J. Michael Daniel says the membership and information sharing both are growing at an impressive pace. He discusses the surge in ransomware and how organizations should respond.
Billions of dollars have already been lost in crypto exchanges, and some of the some losses have been due to "basic" security failures, including third parties not implementing common controls, says Troy Leach, security executive in residence at Cloud Security Alliance.
There's good news and bad news regarding the current state of COVID-19 and its impact, says Regina Phelps, founder of Emergency Management and Safety Solutions Inc. "The rest of the world has moved on, she says, "but … we have a lot more infection and the opportunity for new variants."
The OT market is growing. As a result, the industry is facing a lack of trained professionals with the techniques to perform this function. Therefore, companies need to find a way to attract and train employees to fill this space, says Andre Gomes, product manager at Nexa Resources.
When contracting for modern MDR services, Lyndon Brown of Pondurance advises prospective customers to ask about more than the managed service and detection. He says they should ask tough questions about response. Brown shares his insights and strategies.
Forescout has agreed to purchase startup Cysiv to help OT and IoT customers analyze, detect and respond to threats using cloud-native data analytics. The proposed acquisition will make it easier for customers to mine and cross-reference data that's stored on Forescout's platform.
Atlassian has issued a patch for its Confluence workspace collaboration tool, which is being targeted in the wild with a zero-day vulnerability that gives attackers unauthenticated remote code execution privileges. The vulnerability has a CVSS score of 10 out of 10 for criticality.
Devo has closed its Series F round and notched a $2 billion valuation to incorporate more capabilities into its SOC via acquisition. The company plans to use the $100 million to buy companies that will provide customers with additional intelligence on top of Devo's data for specific use cases.
U.S. government agencies have issued a warning to organizations in the country against paying ransom to the Karakurt data extortion group. The threat actor's promises to delete stolen data and not disclose the security incident to the public if its demands are met are false, the agencies say.
A zero-day vulnerability in Atlassian Confluence, a workspace collaboration tool that serves millions of daily active users, is being targeted in the wild. The flaw, according to the company's security advisory, gives attackers unauthenticated remote code execution privileges.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.