Although many companies are deploying extended detection and response, or XDR, their efforts often are coming up short, says Richard Stiennon, chief research analyst at IT-Harvest.
As a global CISO and privacy officer, Rebecca Wynn has earned her stripes. And she's upfront with her expectations: She will take your security organization to the next level. But she also won't hesitate to walk away if she sees that cybersecurity commitment is nothing but talk.
SolarWinds has uncovered evidence that intruders were in its systems in January 2019, about eight months earlier than originally believed. CEO Sudhakar Ramakrishna says the company discovered the clues by analyzing terabytes of data from its virtual build systems.
Security researchers who track ransomware often think such attacks must have hit their peak and can't get any worse - but then they do, thanks to top gangs continually improving the sophistication of their criminal enterprises, say McAfee's Raj Samani and John Fokker.
In a session at RSA Conference 2021, three cybersecurity experts said top priorities among the U.S. Cyberspace Solarium Commission's recommendations that have not yet been carried out are adopting a federal data breach notification law and improving public-private partnerships.
Nastassja Finnegan, CSO of First National Bank South Africa, says that the key to creating a strong culture of security in an organization is providing the right security context - and failure to do so results in pushback.
While ransomware attacks are largely viewed as cybersecurity incidents, there are critical data privacy concerns that must always be top of mind, says Jodi R. Daniels, founder and CEO of privacy consultancy Red Clover Advisors.
A Russian man was sentenced to five years in federal prison for his role in a $1.5 million scheme that used personally identifiable information stolen online to file false tax returns with the U.S. Treasury Department to fraudulently receive refunds.
Attorney Ann Marie Mortimer shares tips on reducing liability in the event of a data breach and how ordinary security team communications, standard incident response reports and bug bounty payments can make a bad situation even worse.
The ransomware challenge facing organizations today traces directly to the success being enjoyed by gangs who wield such malware, says Palo Alto Networks' Jen Miller-Osborn, who describes new strategies to help disrupt this cybercrime business model, including the launch of the new Ransomware Task Force.
What are the top cybercrime trends and threats coming up, and what should organizations be doing now to best prepare? Trend Micro's Rik Ferguson describes threats that are likely to emerge and intensify by 2030 and what security steps all organizations should be taking now.
A new WastedLocker malware variant, dubbed WastedLoader, is exploiting two vulnerabilities in Internet Explorer to insert malicious advertisements into legitimate websites, the security firm Bitdefender reports.
Cybersecurity professor Ron Woerner defines “unfluence” as the negative side of influence. He describes the principles of influence and psychology and how black hat hackers use them on their victims - and how to defend against these tactics.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.