The German federal domestic intelligence agency is adding to warnings over North Korean IT workers obtaining remote work in Western tech companies. The world's most secretive and repressive regime looks for multiple ways to circumvent strict economic sanctions.
Matt Gordon-Smith has more than 25 years of information security experience and has led security programs. He says networking and relationship-building are critical to career success, but many aspiring CISOs face a major obstacle to interacting with other leaders: imposter syndrome.
Experts told Information Security Media Group the Cybersecurity and Infrastructure Security Agency’s flagship threat sharing initiative faces major logistical hurdles and may need to be replaced with a more mature approach to automated threat analysis following a damning Inspector General report.
Jana Partners has raised its stake in cybersecurity vendor Rapid7 to 13% and is pushing for the company to consider selling itself. The activist investor teamed up with Cannae Holdings and is engaged in discussions with Rapid7's management to explore operational improvements and board restructuring.
Rackspace confirmed that criminals exploited a zero day vulnerability in a ScienceLogic third-party application, forcing the cloud-hosting provider to take monitoring dashboards offline. ScienceLogic confirmed it issued a patch for the zero-day remote code execution vulnerability.
Dragos' acquisition of Network Perception will enrich its real-time network monitoring with robust visualization and configuration analysis tools. This transaction aims to bolster the security of operational technology networks and support customers in building more defensible architectures.
University Medical Center, a Lubbock, Texas-based public health system that includes a level-one trauma center and a children's hospital, is diverting ambulances and working to restore an IT outage affecting some patient services in the wake of a ransomware attack late last week.
Robert Herjavec, outgoing CEO of Cyderes, details why he stepped down and how cybersecurity has evolved over his tenure. From identity management to the compliance role, Herjavec explains how managed services can address today’s cyber challenges and why Chris Schueler was picked as his successor.
In the ever-evolving landscape of cloud computing, security requirements are becoming increasingly complex. As organizations transition to new cloud environments, traditional security measures may no longer suffice. This webinar will delve into three critical topics to enhance your cloud security...
Analysis of the top 35 global breaches in this Forrester’s report, found that, as of the end of last year, attackers made off with over 1.5 billion customer or citizen records and regulatory bodies levied over $2.6 billion of fines for incidents and privacy violations that took place during or before 2023....
Digital forensics and incident response retainer services augment capacity and capability when responding to cybersecurity incidents.
This research report by Gartner, talks about the DFIR market, the current trends, refine requirements and identify market players.
Download this report and learn:
DFIR market and...
The Irish data regulator fined social media giant Meta 91 million euros after an investigation found the company insecurely stored passwords of millions of European Facebook and Instagram users. A Meta spokesperson said the company identified the problem in 2019 and took "immediate action."
Two U.S. senators are proposing stricter cyber mandates for the healthcare sector. The bill provides funding to help hospitals adopt enhanced requirements, but lifts HIPAA enforcement fine caps and threatens executives with prison time for falsely attesting their organizations' compliance in audits.
In the latest weekly update, ISMG editors discussed Microsoft's major cybersecurity overhaul in the wake of some high-profile breaches, the latest developments from CrowdStrike's global outage hearing and the expanding U.S.-led coalition against spyware abuse in the EU.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.