Since the supply chain attack that targeted SolarWinds was uncovered in December 2020, some members of Congress have been pushing for a nationwide data breach notification law. In a panel discussion at RSA Conference 2021, federal officials and a legal expert offered insights on what such a law might require.
Attacks against Colonial Pipeline and other organizations have put ransomware at the top of conversations about cybersecurity. Megan Stifel of the Global Cyber Alliance believes new approaches are needed now.
A data security incident involving a Canada-based insurer that provides comprehensive health coverage to students studying abroad shines a light on complex international regulatory issues companies can face in the wake of a data breach.
Want to stay well-protected against emerging cybersecurity threats? Keep a close eye on the latest headlines, says BlackCloak's Chris Pierson, who recommends organizations continually refine - and practice - their incident response plan based on the latest real-life attack scenarios.
Investigators at industrial cybersecurity specialist Dragos say an employee of the water treatment plant in Oldsmar, Florida, where a cyberattack was thwarted, had visited an infected website the same day, but that apparently played no role in the security incident.
What more can be done to disrupt cybercrime operations and embolden even tough-to-reach jurisdictions to take action against suspects? Craig Jones, director of cybercrime at Interpol, describes recent disruptions - for example, of Joker's Stash - and takeaways for combating today's top online threats.
Are there better ways to characterize, assess and handle big, bad bugs to help organizations better prioritize remediating them? Allan Liska, an intelligence analyst at Recorded Future, discusses better ways to focus vulnerability hunting.
It's common to say, "The human element is our weakest cybersecurity link." But author and educator James Bone has a different perspective. He weighs in on the human factor and the criticality of modifying enterprise risk management strategies.
Wendy Nather, head of advisory CISOs at Cisco, recently teamed up with researcher Wade Baker to investigate cybersecurity metrics and determine how to make a cybersecurity program measurably more successful. She shares some of her more surprising findings.
The COVID-19 pandemic created unique conditions for technology and surveillance practices to erode global privacy. In this discussion of their RSA Conference keynote, Niloo Howe and David Cole share their research, case studies and analysis.
How has the shift to remote working and multi-cloud environments affected the Security Operations Center, or SOC? Gene Yoo, CEO of Resecurity, and Bob Schlotfelt, CISO of the Los Angeles County Employees Retirement Association, discuss the state of the SOC today and essential steps to consider when outsourcing...
Securing the perimeter has given way to securing the application environment. And with this shift comes a new urgency to inject real-time security solutions in these dynamic new environments. Sameer Malhotra, CEO and co-founder of TrueFort, shares insights.
The "zero trust" security model, in the context of mainframe security, might be different than you'd think. Stuart McIrvine of Broadcom separates myths from realities and discusses the life cycle of zero trust on the mainframe.
Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.