Four ISMG editors discuss important cybersecurity issues, including lessons learned from the cyberattack on a steelmaker in Iran that caused a serious fire, how the economic crisis in Sri Lanka is affecting cybersecurity and what the rising cost of cyber insurance means for the industry.
The role of cyberattacks in Russia's war against Ukraine continues to evolve as the conflict persists, but one notable takeaway so far is the precision of the military's online attacks, which is likely an attempt to avoid spillover that would anger NATO, says Ian Thornton-Trump, CISO of Cyjax.
It's not the emerging technology or the increasingly complex threat landscape. Instead, people and process are what prove to be consistently the most challenging parts of the job for Caleb Sima, chief security officer at Robinhood.
The enterprise, workforce, attack surface and threat landscape all have transformed over the past two years. How has the concept of cyber resilience also transformed? Kris Lovejoy of Kyndryl shares insights on resilience maturity and why it's about recovery.
Four ISMG editors discuss important cybersecurity issues, including the hot topics at ISMG roundtable discussions - such as challenges around software supply chain security, highlights from ISMG's upcoming Healthcare Summit, and how some cybersecurity vendors are creating their own venture funds.
It's been a year since President Biden's executive order that called out zero trust as a primary focus. Richard "Chit" Chitamitre of Corelight discusses the prevalent misunderstandings about zero trust, as well as use cases for how to embrace the framework and make measurable progress along the way.
The Biden executive order on cybersecurity was a catalyst for action, with tight delivery times for steps including promotion of SBOMs and zero trust. The cyber-physical nexus and expanding threat surface mean it's not easy to maintain vigilance, but recognizing that is the first step.
A rise in remote employees and an increased reliance on SaaS applications create new, wider gaps in security. It’s more challenging to protect users at the edge. In this preview of an upcoming webinar, Cisco's Mike Storm discusses how to increase security and reduce complexity.
Four ISMG editors discuss important issues, including how Russia's cyber and kinetic wars in Ukraine have changed the cybersecurity landscape, what recent layoffs at cybersecurity firms mean for the industry and how cybercriminals are taking a page out of the white hat hacker playbook
The data collected in the KYC process shouldn’t be the only information financial institutions rely on to approve clients and mitigate fraud risk. Traditional KYC tools were designed to stop money laundering and terrorism, not determine whether someone is who they claim to be. This means it’s increasingly...
Beyond advising the seniormost levels of the business in the strategic use of technology, the need to recruit new cybersecurity professionals often also tops the list of tasks facing today's security leaders, says Rob Hornbuckle, CISO of Allegiant Air.
For the seventh year in a row, business email compromise produced the largest losses of any type of cybercrime, according to Steve Dougherty of the U.S. Secret Service. He says organizations need to build and maintain relationships with law enforcement agencies before an attack happens.
The UK Cyber Security Council is responsible for running the cybersecurity industry’s Cyber Certified Professional scheme. The council seeks to set the standard for chartered cybersecurity professionals and align with qualifications and certifications in the sector, says council CEO Simon Hepburn.
Ransomware-wielding criminals constantly refine their behavior and tactics to maximize the chance of a payday, and recently they have been implementing fresh strategies for monetizing stolen data, says Steve Rivers at threat intelligence firm Kela.