In this edition, four ISMG editors discuss important cybersecurity issues, including how virtual currency Monero is becoming the main alternative to Bitcoin as the crypto choice for criminals, the challenges involved in an identity-centric Zero Trust approach and how to influence change in culture.
The healthcare industry continues to be targeted by ransomware gangs, but there are efforts underway to help improve the health sector's information security resiliency. Errol Weiss of Health-ISAC says the industry as a whole lacks resources.
Forrester analysts Allie Mellen and Jeff Pollard discuss their new research on the analyst experience, or AX. AX involves how security analysts perceive their interactions with security products, services and processes, and Mellen and Pollard say it can improve the SOC and security analyst workflow.
How does one decide the right approach to zero trust, and what are some important considerations to keep in mind? A panel of experts - Brett Winterford, Chirag Joshi and Jay Hira - share their in-depth views and discuss issues including how to take an identity-centric zero trust approach.
Octavia Howell has been a trailblazer throughout her career in information security. And as vice president and head of information security and risk for Equifax Canada, she takes great pride in giving opportunities to other women to carve out their own unique paths.
The 2021 Dragos ICS/OT Cybersecurity Year in Review report says the number of industrial organizations with external connections to their industrial control systems has doubled, yet 86% of organizations report limited to no visibility of ICS environments. Tom Winston outlines the top challenges.
Four editors at ISMG discuss the percentage of banks hit by ransomware - and paying the ransom, the HHS warning to healthcare entities as they continue to be targeted by the Hive ransomware group and reports that the U.K. government has been infected with NSO Group spyware.
VMware's Tom Kellermann is out with Modern Bank Heists 5.0, his latest look at the attackers and attacks targeting financial services. Subtitled "The Escalation," this report looks at the increase in destructive attacks, ransomware and hits on cryptocurrency exchanges. Kellermann shares insights.
While zero trust as a strategy is meant for every organization, attaining 100% zero trust is not, says Jay Hira, director of cyber transformation at EY in Sydney.
Accenture's new ransomware report reveals key challenges in executing an effective communications plan. Robert Boyce, managing director of global cyber response, discusses why existing recovery strategies aren't enough and offers practical steps for managing a ransomware response.
The 2022 ISACA State of Cybersecurity report reveals trends in the cybersecurity workforce and the threat landscape, including understaffing and retention. "The imbalance between supply and talent is unchanged," says Jon Brandt, director of professional practices and innovation at ISACA.
As enterprises continue to embrace alternate methods of payment structure, card-not-present, or CNP, fraud will develop into other types of fraud. What will these types be? Experts Dondi Black of TSYS Payment Solutions and Dave Excell of Featurespace - share their views.
For organizations with legacy systems, effective security and risk management remain essential as they transition to cloud or hybrid environments, says Davanathan "Devan" Naidoo, CIO of New Dimension Corp. He shares essential strategies and lessons learned.
Sunder Krishnan, chief risk officer at Reliance Nippon Life Insurance Co., a joint venture of Reliance Capital and Nippon Life, discusses risk management approaches; using PAM, data encryption and other processes to safeguard customer data; and investing in behavioral systems to secure data.
David Pollino, former CISO of PNC Bank, joins two editors at ISMG to discuss what organizations can do to harden their cybersecurity defenses, how we need to think about our adversaries differently in today's threat landscape and how the "Great Resignation" is affecting cybersecurity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.