Obtaining threat insight is like practicing judo - you want to use your attacker's power against them, says Chris Borales, senior manager of product marketing at Gigamon. He and Tom Dager, CISO of Archer Daniels Midland Company, discuss how to keep pace with the evolving ransomware landscape.
The interconnectedness and interdependence of today’s world has led to incredible growth, innovation and benefits across the technology sector. But when considering cybercrime and cyberattacks, that interconnectedness and interdependence could lead to more disruption, destruction and broad-reaching collateral...
The integration of third-party components and software is an increasingly critical area of security risk that needs more attention from medical device manufacturers, says Anura Fernando, global head of medical device security at safety certification firm UL.
As Russia's invasion of Ukraine continues, what should global CISOs and security teams do to ensure that their organizations stay protected? Beyond following cybersecurity agencies' guidance, experts offer advice on how to brief the board of directors, appeal for resources, support teams and more.
Remote work presents many opportunities for businesses, but also has its challenges: How do you maintain security
throughout the business? How do you ensure employees have access to the resources they need to stay productive? Remote work doesn't need to be a challenge with the right password security in place.
...
Employees with too much access can pose an insider threat. When employees have access to more than they need to do their job, there are more opportunities for mistakes, whether accidental or not. Lack of accountability means you
don’t know who did what, when. If too many people have the same level of access and...
Britain's National Cyber Security Center has launched a trial vulnerability management project called Scanning Made Easy, designed to empower small and midsize organizations to identify if critical software flaws are present in their IT infrastructure, so they can be targeted for remediation.
The Log4j vulnerability caused plenty of stress for tech practitioners, and while it’s likely under control now, it’s essential to take the opportunity to learn from these events to improve security.
Join this interactive session to review what the latest Zero Day threat taught us about current security...
We began last January with the realization that we have met a new and far more difficult class of cyber threat with the SolarWinds attack followed by the Colonial Pipeline attack in May. Both point to a fully wired world where physical and digital are colliding at unprecedented speeds.
If we had to choose a theme...
"Mainframe" and "modernization" are not often used in the same sentence. But Eric Odell and Paul Allard of BMC Software share a mainframe DevOps strategy that can result in cost savings, automation efficiencies and reduced risk of mainframe defects.
The cybersecurity space has been disrupted. A storm of ransomware attacks, new hacking methodologies emerging from remote work set-ups, and threats of data breaches from internal and external sources are making organizations ask the question: “How can we prepare ourselves for what’s next on the horizon for...
Everyone knows the OWASP Top 10 lists of application security and API risks. But what about #11 and beyond - aren't those key priorities, too? Matt Tesauro of Noname Security talks about "Beyond the Top 10" and relates it back to mitigating the Log4j zero-day vulnerability.
Hellman Worldwide Logistics, one of the world's biggest logistics and shipping firms, is warning that its operations remain disrupted following an online attack of unspecified nature. The attack comes amid a busy season for e-commerce and shipping, with supply lines already stretched thin, experts say.
While there are many solutions that claim to simplify certificate lifecycle management, not all of
them are built to address the unique complexities of today’s expansive and distributed digital
environments.
When evaluating a certificate management solution, it is important to look for
key capabilities that...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing covid19.inforisktoday.com, you agree to our use of cookies.