Organizations ranging from multinational corporations to government agencies and international nonprofits require cybersecurity expertise. These roles often include exciting opportunities for travel or relocation, making them an attractive path for professionals ready to take their careers global.
New York state authorities fined auto insurance giant Geico $9.75 million for failing to protect customers' driver's license numbers during a wave of cyber incidents in early 2021. Travelers will pay $1.55 million after hackers used stolen credentials to filch license numbers in mid-2021.
Allegations of conflicts of interest in Cyberstarts’ Sunrise program have sparked debate in the CISO community. While the program connected CISOs with startups for advisory purposes, its profit-sharing incentives drew criticism, leading some participants to resign and the firm to halt compensation.
One post-election question pertaining to Donald Trump's upcoming presidency is how his administration will choose to combat cybercrime, and to what extent the White House will continue to take a leadership role in combating ransomware and cybercrime - especially based in Russia.
As API adoption expands, organizations face unique security risks. Traditional website protection measures fall short, leaving businesses vulnerable to authentication and authorization abuses, said Richard Meeus, director of security technology and strategy for EMEA at Akamai.
Google asserts that platformization and consolidation can help contain today's sophisticated threats. Embedding generative AI into security is also required as the industry moves from assisted AI to semi-autonomous and, eventually, to autonomous security, with the goal of security by default.
The demand for skilled cybersecurity professionals, coupled with the rise in remote work, has led to an increase in fraudulent job postings targeting tech-savvy individuals. Learn why this is so and how to protect yourself from deceptive schemes as you pursue a job in cybersecurity.
Dating apps collect and sell user location data, leading to significant privacy risks. Users are vulnerable to stalking, harassment and even prosecution in certain countries, says Victor Le Pochat, postdoctoral researcher at KU Leuven. Pochat and Dhont called for improved data protection measures.
APIs are the connections that make digital business happen. Companies on average rely on more than 15,000 APIs, but these interfaces pose security risks. In this "Deep Dive" special report, ISMG's Anna Delaney explores how security leaders are tackling API security.
Akamai’s $450 million acquisition of No Name Security marks a pivotal point in API security. Oz Golan, Noname's CEO and Akamai's vice president of API security, discusses the integration plans, technological synergies, and future growth opportunities that come with Akamai’s extensive customer base.
Welcome to "Cyber Fail," where our experts uncover fails so we can all strengthen our defenses. Today, we take on the looming menace of zombie APIs, the terrors of election dysfunction and the scary legacy of government-backed spyware and its impact on privacy rights.
Despite all the platformization buzz, there are very few vendors with market-leading capabilities in at least three disparate security technology categories. That could change if Google forges buys cloud security firm Wiz for a reported $23 billion just two years after buying Mandiant.
The cybersecurity field offers numerous opportunities to specialize and deepen your expertise in niche areas. Here are some sophisticated niches that offer advanced career paths for midlevel professionals and some avenues you can pursue to gain experience while building your portfolio and skills.
The theft of terabytes of Snowflake customers' data through credential stuffing hacks highlights how multifactor authentication shouldn't be optional for safeguarding accounts. Experts are calling on providers to build in more robust identity and authentication security features, at no extra cost.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.