It's critical to enable companies to not only see what is going on in their IT environments but to also quickly react, and "sheer manpower" is no longer sufficient to respond to the surge of cyberthreats evolving today, says Mike DeCesare, CEO of Exabeam.
A phishing campaign used stolen credentials to log into Facebook user accounts and send links leading to phishing pages to the victims' friends to harvest their credentials. Researchers detail the evasion techniques the threat actor allegedly used to likely make millions from the scam.
Businesses want to reduce the complexity associated with encryption and key management in the cloud, according to a survey of more than 2,700 IT professionals conducted by Thales. Todd Moore, the company's vice president, encryption products, addresses the survey's biggest findings and takeaways.
While ransomware, third-party risk, phishing scams and insiders continue as the top threats facing healthcare and public health entities, the sector overall is becoming better prepared to deal with these issues than it was just a few years ago, says Denise Anderson, president and CEO of H-ISAC.
Customers, channel partners and technology partners are dealing with a broad range of security concerns spanning the gamut from the sophistication of the threat landscape to the skills shortage. John Maddison, Fortinet's CMO and EVP, products breaks down the most urgent priorities.
Cyber adversaries are embracing defense evasion, triple extortion, wiper malware and the accelerated exploit chain, and that is significantly reshaping the threat landscape that CISOs have to deal with, according to Derek Manky, head of Fortinet's FortiGuard Labs.
What are the top five security activities that lead to the best outcomes, and why do they work so well? Those critical issues were closely examined in a recent study commissioned by Duo Security/Cisco, says Helen Patton, advisory CISO, who discusses the findings.
The Cuba ransomware group, which has previously targeted U.S. critical infrastructure firms, has updated its malware to "optimize" execution and "minimize" unintended system behavior, says Trend Micro. Researchers at Elastic Security Labs also share malware analysis, TTPs and detection techniques.
Companies need better visibility into their ever-changing distributed environments "like never before," says Mike Kiser, director of strategy and standards at SailPoint. He discusses cloud governance, digital transformation and identities, and the importance of transparency in automation.
One of the most important recent developments by CISA has been the creation of the Joint Cyber Defense Collaborative, which is focused on operational private-public collaboration, says Kiersten Todt, CISA chief of staff.
With rising threats facing critical infrastructure sectors, such as healthcare and financial services, "society as a whole, and the safety of society, is completely dependent on cyber risk" - and being security resilient, says Jeetu Patel of Cisco.
In an organization, people are the ones who develop and sustain organizational strategy. Talented people are discovering that it's possible to leave a toxic environment so they can breathe and thrive. Marco Túlio Moraes explores how to retain both talent and strategy.
What are some challenges of shifting on-premises PAM to the cloud, and how should one go about it? Peter Gankin, head of identity and access management at Takeda, a Japanese multinational pharmaceutical company, shares his views.
CISA says Chinese state-sponsored threat actors are exploiting known vulnerabilities to target public and private companies in the United States, and a related joint advisory from CISA, the FBI and the NSA describes how major telcos and network service providers have been exploited since 2020.
For CISOs, it's critical to not implement security without first carefully considering the user's experience, says Bernardo Vasquez, advisory CISO in the strategic client practice of Palo Alto Networks. He explains why and discusses other topics, including ZTNA 2.0.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.