New York-Presbyterian Hospital CISO Jennings Aske describes his organization's COVID-19 security challenges and response, and the critical lessons learned while dealing with a pandemic in the nation's top hot spot for disease outbreak.
Two years after it was last seen in February 2018, ZLoader banking malware has resurfaced, with cybercriminals wielding a new version that gets distributed via email campaigns, security firm Proofpoint warns.
Microsoft is warning Windows users about an ongoing "massive" COVID-19-themed phishing campaign that is attempting to install the NetSupport Manager on devices. Attackers can turn NetSupport into a remote access Trojan, or RAT.
The latest edition of the ISMG Security Report features Retired General Keith Alexander, former NSA director, discussing the long-term security implications of the shift to working from home. Also: an update on ransomware gangs leaking data and an analysis of using open source code for app development.
The massive shift to remote working as a result of the COVID-19 pandemic means more organizations are adopting the "zero trust" model, taking such steps as implementing proper access controls, monitoring user behavior and building data governance policies.
The U.S. Treasury's Financial Crimes Enforcement Network is alerting financial institutions about surging COVID-19 themed scams and other "illicit activities," ranging from fraud involving the sale of fake cures, tests and vaccines to price gouging for supplies.
Business and security leaders accept that a hybrid workforce is the new norm - some staff members based in a central office and many others permanently working at home. But what new cybersecurity demands does this strategy present short-term and into 2021? Our expert panel shares insights.
Fraudsters are now using numerous spoofed website templates with COVID-19 themes as part of phishing attacks designed to steal login credentials and banking data, according to Proofpoint.
What should your organization be doing to meet the extraordinary challenges facing IT teams the world over during this time of massive change?
Download this white paper and learn how to:
Shift to a work-from-home model;
Secure a borderless network;
Optimize teams and tool efficiency and achieve overall cost...
The financial services industry sees it all - from credit card fraud to identity theft. To combat these threats, the industry adopts a Zero Trust architecture that also meets consumer and regulatory demands. With Zero Trust in place, you'll improve compliance, visibility and network security.
If security matters...
Healthcare CISOs across the country were faced with the same challenge at the beginning of 2020: How do we ensure our organizations are secure as our health systems shift to treating a pandemic, supporting a work from home strategy for non-essential employees, and pivot to telehealth? Many already had crisis...
Join us for a discussion about how cloud deployment planners need to be ever-vigilant for all types of cybersecurity attack vectors. COVID-19 has rapidly transformed how we all work. Organizations need quick and effective user security to address the changing needs of the new normal. The threat environment is...
Besides hospitals and academic institutions, dozens of nonprofits, including nongovernmental organizations - or NGOs - around the world must protect their COVID-19 research and related activities from those seeking to steal data or disrupt their operations, says cyber risk management expert Stanley Mierzwa.
With the outbreak of COVID-19, the demand for remote work has increased exponentially. Working from home presents a different set of cybersecurity challenges with most home offices having off-the-shelf routers with minimal security countermeasures.
The new remote work and remote learner environments provide...
Organizations must carefully re-examine their security procedures to make sure they're adequate for the new work-from-home environment during the COVID-19 crisis, says Shelton Newsham, a British law enforcement official who specializes in cybersecurity. He reviews key questions to ask.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.