VMware is warning all vCenter Server administrators to patch their software to fix a serious vulnerability that could be used to execute arbitrary code as well as a separate authentication flaw. Experts warn that these and other recent flaws are likely to be targeted by ransomware gangs.
Network intrusion displaced phishing as the leading hack-attack tactic last year, while ransomware continued to surge as the pandemic complicated incident response efforts, says BakerHostetler's Craig A. Hoffman, who describes trends from the 1,250 incidents his firm helped manage.
To unlock the value of quantum computing, two systemic risks - tech governance and cybersecurity - need to be overcome, says William Dixon of the World Economic Forum.
Fintech firms offer established financial services companies the ability to navigate the open banking revolution, but convincing them to rely on emerging cloud, container and other technologies requires flexibility and salesmanship, says Finleap Connect's Francis McGillicuddy.
Driving employees to make cybersecurity a core part of their work vision and mindset continues to be a challenge. Anne Hännikäinen, CISO of Fintraffic, describes essential best practices, from having senior leadership on board to facilitating better communication via such strategies as gamification.
As the head of product security for LeanIX, Michael Lines is primarily focused on risk management, risk assessment and data governance. He tells why he believes that more security leaders and CISOs should focus on risk.
As both a CISO and CTO, Tim Heger is in the unique position of shaping HealthBridge's approach to security as well as adopting new technologies to keep the organization on the cutting edge. In his spare time, he helps mentor and encourage startups.
Diego Souza's main responsibility as the global CISO at Cummins Inc. is focusing on the gap between IT and OT security and effectively communicating risk and other security issues to the board. But his passion is developing and mentoring the next generation of cybersecurity leaders.
Carl Pei, co-founder of OnePlus, a smartphone company, said Tuesday that his Twitter account had been compromised via a third-party app called IFTTT and a tweet had been injected via his profile for an apparent cryptocurrency scam.
Iran is using its abundance of oil to generate electricity that powers a massive bitcoin cryptomining operation that enables the country to turn its greatest natural resource into money, offsetting some of its income lost as a result of economic sanctions, according to cryptocurrency analysis firm Elliptic.
Where were you on May 25, 2018? That was the day the EU's General Data Protection Regulation went into full effect. Three years later, some legal and privacy experts say that while the global privacy discussion and expectations have evolved, GDPR still has some growing up to do.
Experience as a chief enterprise architect offers excellent underpinnings for performing as a security leader, in that both roles require creating and executing a vision, backed by stakeholder buy-in and navigating obstacles - no matter the scarcity of resources, says Suren Naidoo, CISO of The Foschini Group.
"No risk, no business." As global CISO of Egyptian Arab Land Bank, Mohamed Mostafa says he regularly applies that maxim, which he learned from a prior boss, as he seeks to maximize his organization's security posture while working closely to collaborate with every line of business.
The U.K.-based insurance firm One Call says it has successfully restored its systems in a new environment that is separate from the one that was impacted by a ransomware attack May 13, adding that a ransomware note which purported to be from DarkSide could not be verified as authentic.
Healthcare went through five years of transformation over the course of 2020. How does this new telehealth focus most change how healthcare security leaders must view cybersecurity? Hank Schless of Lookout weighs in on remote services, connected devices and the cloud.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.