It’s serious, impactful and raises new questions about critical infrastructure protection. But don’t tell Philip Reitinger of the Global Cyber Alliance that the Colonial Pipeline ransomware attack is any kind of a “wake-up call.” He says we’re long past that.
Four editors at Information Security Media Group discuss timely cybersecurity issues, including a call for cryptocurrency regulation and the impact of hospital ransomware attacks.
In light of the surge in ransomware attacks against universities, institutions need to make asset management a much higher priority, removing obsolete systems and upgrading essential systems to the latest version to avoid exploits of unpatched vulnerabilities, says Matthew Trump of the University of London.
Effective vulnerability management requires more frequent scanning of infrastructure, says Steve Yurich, CISO at Penn National Insurance, who explains his organization's approach.
Four editors at Information Security Media Group discuss timely issues, including how the zero-day attacks against Accellion File Transfer Appliance users have rewritten the rules of the cyber extortion game and former federal CISO Gregory Touhill taking on an important new role.
Almost every organization has adopted cloud computing to some extent, and with this great power comes great responsibility. How are cybersecurity leaders managing visibility, access and risk? We asked this exclusive panel of CEOs and CISOs, and they shared frank and thoughtful advice.
COVID-19 infections and death rates are down in the United States, and the percentage of vaccinated citizens is rising. Does this mean the end of the pandemic is finally in sight? Not quite, says continuity planning expert Regina Phelps, who explains why.
Guy Caspi, CEO of Deep Instinct, is so sure of the power of his company’s ransomware defense solution that he’s now offering a performance guarantee that includes a warranty of up to $3 million per company, per breach. What gives him such confidence?
The U.S. Sarbanes-Oxley Act of 2002 mandated strict reforms and imposed tough new penalties on lawbreakers in an effort to crack down on corporate fraud. The U.K. might soon adopt similar legislation. How must enterprises prepare for this?
One consistent theme in Andrea Szeiler's career: She’s always been drawn to "the challenge." And in her roles as global CISO for Transcom and president of WITSEC, she’s currently tackling some meaningful ones.
More use cases are emerging for self-sovereign identity, which gives individuals more control over their digital identities, according to Heather Dahl and Ken Ebert of Indicio.tech.
The economics of vulnerability discoveries and exploits is always evolving, and knowing those dynamics can provide insights into what attackers are doing, says Casey Ellis of Bugcrowd.
Ransomware attacks now routinely feature multifaceted extortion efforts, and defenses need to evolve, says Stuart McKenzie of FireEye, who offers an analysis of the findings of the FireEye M-Trends 2021 report.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.