The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.
Digital dilemmas have driven security to the forefront of business leaders' priorities. Understanding how to provide security at the speed of change and build a cyber-resilient organization will drive competitive advantage and help organizations run and transform with ease.
Independent Research Firm uncovers that significant events would need to happen for organizations to elevate the importance of third-party cyber-risk mitigation strategies.
By Sounil Yu, CISO and Head of Research of JupiterOne
Resilience is often defined as being able to withstand disruptions and rebound to a previous state. But a system's ability to return to a prior state doesn't mean it's sufficiently resilient.
Combining this comprehensive ransomware recovery module with Druva's built-in security framework, businesses can now better protect critical data and recover faster with confidence.
Hacker-turned-entrepreneur Marc Maiffret reflects on his past few years "embedded" with enterprise security teams and how it has shaped his security view.
By IFSEC Global Staff, Part of the Informa Network
An analyst at the Defence Space Administration, Nigeria, Elizabeth Kolade was named in the list of 'One to watch: Security' for the IFSEC Global Influencers in Security and Fire 2021. Julian Hall put some quickfire questions to her on the trends and issues she's witnessing in the sector.
Crypto thieves rely on users not noticing installation of their tiny payload on thousands of machines, or the CPU cycles being siphoned off to perpetuate the schemes.
Patches for dependencies are trickling up through the open source ecosystem faster than ever β a good thing because attackers are focusing more on open source software.
Founding members of the MANRS Initiative will tackle the systemic vulnerabilities of global routing security through groundbreaking collaborative action.
Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-generation solutions won't go far enough without also addressing security and operational fundamentals.
Attackers leveraging the flaw are using infrastructure associated with other criminal groups, including ransomware-as-a-service operators, the company says.
Findings are presented in HPE's "Future of Healthcare" Report, which surveyed healthcare clinicians and IT Decision Makers (ITDMs) in the United States and United Kingdom.
By Shane Buckley, President & Chief Operating Officer, Gigamon
As organizations strive for a new version of business-as-usual, executives must prepare for challenges around infrastructure, varying guidelines, and balancing employee flexibility with office collaboration.
The Open Web Application Security Project reshuffles its list of top threats, putting broken access controls and cryptographic failures at the top and creating three new risk categories.
Security researchers share the details of four flaws in Open Management Infrastructure, which is deployed on a large number of Linux virtual machines in Azure.
By Tom Fetters, North American Vice President for Global Digital Solutions, Iron Mountain
Having a gold copy of critical data offline is essential in every organization's disaster recovery or continuity plan. Follow the 3-2-1-1 rule to secure your data.
Users can now delete passwords from their Microsoft account and instead use Windows Hello, Microsoft Authenticator, or physical security keys to log in.
By Bob Blakley, Senior Director, Global Security Services
There's a scarcity of customers using managed security services who are willing to talk to others about their experiences. Here's how to work with your vendor(s) to leverage their customers' experiences and hard-won wisdom.
Why hasn't a problem that's lasted for more than 40 years been solved after hundreds of billions of dollars have been spent? Let's take a new approach.
Though overall ransomware attack volumes dipped in the first half of this year, the number of campaigns involving three and four extortion methods increased.
By Gedeon Hombrebueno, Product Marketing Manager, Cisco
In the "Proven Success Factors for Endpoint Security" report, Cisco Security shares a global perspective on reported cyber events in the past two years.
By Richard Searle, Customer Solutions Director at Fortanix
The key to protecting these systems is not only to ensure the control environment is secure and protected but also to deploy emerging technologies such as confidential computing.