Two cybercrime ecosystem cornerstones today are high-end bulletproof hosting services and ransomware, says Mark Arena, CEO of Intel 471. He notes that ransomware-as-a-service operations don't function like gangs or the Mafia, but rather as individuals collaborating "based on a culture of mistrust."
How can financial institutions deal with the problem of authorized push payment fraud? Three experts - Karen Boyer of People’s United Bank, Alasdair MacFarlane of NatWest Bank and Dave Excell of Featurespace - offer their insights on best practices.
How do criminal affiliates of ransomware-as-a-service operations think? Craig Williams and Matt Olney of Cisco Talos describe insights shared - accidentally and otherwise - by "Aleks," a Russian affiliate of the LockBit ransomware-as-a-service operation.
Cybercriminals and nation-states are attempting to recruit insiders at companies around the world to help steal credentials and intellectual property, says Joseph Blankenship, vice president and research director at Forrester, who offers risk mitigation insights.
How can organizations update their SOCs to ensure they keep up with evolving cyberthreats? Three experts - Sean Duca of Palo Alto Networks, Rishi Rajpal of Concentrix and Anish Ravindranathan of Tata Digital - offer insights.
In the latest weekly update, a panel of Information Security Media Group editors discusses key topics, including NATO's new cyber defense policy, the outlook for congressional regulatory action to address the ransomware threat, and cybersecurity comments by U.S. Rep. Jim Langevin.
Jim Bray of Identité, an authentication solutions firm, and Steve Ledford of The Clearing House, a payments platform that all federally insured U.S. depository institutions are eligible to use for payments, discuss the role that biometrics can play in preventing P2P payment fraud while maintaining consumer...
To enhance privileged access management for operational technology, organizations should use specialized remote access solutions for vendors that are allowed to access OT networks, says Felix Gaehtgens, an analyst at Gartner.
Criminals tricked into using an FBI-run encrypted messaging app, Verizon's 2021 Breach Investigations Report and overcoming the challenges of recruiting cybersecurity professionals are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.
There is a skills shortage in most tech roles, but cybersecurity for critical infrastructure is a newly identified problem requiring new approaches. Mex Martinot of Siemens Energy gives advice on steps to bridge the cybersecurity skills gaps for critical infrastructure in the Asian energy sector.
For Nicki Doble, group CIO and CISO at Cover-More Group - an Australian travel insurance company and part of the Zurich Insurance Group - the top priority is global security and privacy standardization across the organization.
Security automation is going to be the key for organizations to proactively protect themselves and also investigate incidents. Ty Miller of Threat Intelligence says security automation is driving everything from penetration testing to incident response.
There are fundamental challenges in how enterprises secure SOC data, and they start with: How do you grant access to the right people and deny it to the wrong people? Carolyn Duby of Cloudera opens up on how to address data governance, privacy and security concerns.
A lot of CISOs talk about having security "baked into" their products and solutions. But for Stephenie Southard, vice president and and CISO at BCU, security leadership is all about ensuring that cybersecurity is part of the enterprise's very fabric.
Ransomware attacks have evolved over the years as attackers have come out with new strategies for digital extortion, says Chris Novak, global director of the Threat Research Advisory Center at Verizon Business Group. He shares insight from the Verizon 2021 Data Breach Investigations Report.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.