Sen. Ron Wyden, D-Ore., and Rep. Lauren Underwood, D-Ill., have introduced a bill designed to patch loopholes in the Federal Cybersecurity Enhancement Act of 2015 that they say allow federal agencies to easily avoid implementing required cybersecurity procedures.
Ransomware continues to pummel many types of organizations, recently including South Korea's E-Land retail group, French newspaper Paris-Normandie and a Georgia county school system. A ransomware hit against hosting giant Managed.com has resulted in ongoing site outages for numerous others.
In the wake of the pandemic and the accelerated opening of digital accounts, fraudsters have changed their game to take advantage of financial institutions. But Kimberly White of LexisNexis Risk Solutions has new strategies and tools to help give institutions a fraud-fighting edge.
Learn how to get powerful protection against today's biggest threats with Cisco Umbrella, a cloud-delivered security service that is simple and cost-effective for a team of any size to deploy, use, and manage, with no hardware to maintain or upgrade. Umbrella protects your users wherever they choose to work and speeds...
U.K. Prime Minister Boris Johnson announced Thursday the creation of a National Cyber Force designed to strengthen Britain's cybersecurity posture and give the country new defensive and offensive capabilities. Some security experts, however, are raising concerns about recruiting enough qualified staff members.
This edition of the ISMG Security Report features a discussion with Christopher Krebs, the recently fired director of the Cybersecurity Infrastructure Security Agency, on his accomplishments at the agency. Also featured are updates on ransomware gangs recruiting affiliates and healthcare supply chain risks.
"Has anyone witnessed any examples of criminals abusing artificial intelligence?" That's a question security firms have been raising. A new report has identified likely ways in which such attacks might occur and offers examples of threats already emerging
View this webinar, as we explore these topics and many more to outline how these architectures and aspirations lay the groundwork for a better user experience, increased reliability of your services, as well as increased security for all your web-facing business functions.
Some security experts say the United States' cybersecurity and overall defense posture are likely temporarily weaker because President Trump fired the leaders of the Cybersecurity and Infrastructure Security Agency and the Defense Department. But many remain confident defenses will be strong in the long run.
The Chinese hacking group "Cicada" is exploiting the critical Zerologon vulnerability in Windows Server as part of a cyberespionage campaign that's mainly targeting Japanese companies' locations around the world, according to the security firm Symantec.
European lawmakers are once again considering encryption policies and attempting to strike a balance between the privacy and security afforded by strong encryption and law enforcement's needs. But with encryption being a cornerstone of the internet, is there any new balance to be struck?
Organizations need to build security into their cloud environments to help thwart cyberthreats, says Tom Corn of VMware, who describes this "intrinsic security" approach.
Waves of support from the InfoSec community continue to pour in for former CISA Director Christopher Krebs, who was fired Tuesday by President Donald Trump. Meanwhile, an acting CISA director reportedly has been named, and Deputy Director Matt Travis has resigned.
Researchers are warning that many domain name system server implementations are vulnerable to a spoofing attack that allows attackers to redirect, intercept and manipulate traffic. Thankfully, fixes are already arriving for this so-called SAD DNS flaw.
Microsoft's Security Intelligence team is warning users of the Office 365 suite about an ongoing phishing campaign that appears to be harvesting victims' credentials. The emails use several techniques to bypass and evade secure email gateways.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.