Fraud Management & Cybercrime , Fraud Risk Management , Next-Generation Technologies & Secure Development

Global Incident Response: The Rise of Integrity Attacks

Tom Kellermann on Emergence of New Destructive Attacks and Cloud Jacking
Tom Kellermann, head of cybersecurity strategy, VMware Carbon Black

Tom Kellermann calls it a new "Twilight Zone" - an era in which cybersecurity adversaries can unleash destructive attacks that manipulate time, data, audio and video. The cybersecurity strategist shares insights and analysis from his latest Global Incident Response Threat Report.

See Also: OnDemand: AI Model Security Challenges: Financial and Healthcare Data

Kellermann, head of cybersecurity strategy at VMware Carbon Black, warns in this report that the broadened attack surface, weaponization of new technologies and the industrialization of cybercrime have reshaped the threat landscape. And he describes how enterprises need to defend.

In a video interview with Information Security Media Group, Kellermann discusses:

  • The report's most important - and surprising - findings;
  • The rise of integrity attacks and cloud jacking;
  • How organizations can and must practice better cyber vigilance.

Kellermann, head of cybersecurity strategy at VMware Carbon Black, is the former CEO of Strategic Cyber Ventures. He served on the Commission on Cyber Security for the 44th president of the United States and was an adviser to the International Cyber Security Protection Alliance. When he served as chief cybersecurity officer for Trend Micro, he was responsible for analysis of emerging cybersecurity threats and relevant defensive technologies.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.