The ISMG Security Report analyzes a settlement with the U.S. Justice Department, in which Uber accepts responsibility for a data breach cover-up to avoid criminal charges. It also discusses why early-stage startups are conserving cash and recent initiatives from the U.S. Federal Trade Commission.
The report from Israeli publisher Globes that CrowdStrike plans to spend $2 billion buying one or more Israeli cybersecurity companies sent shockwaves through the industry. Here's a look at six security startups with a large presence in Israel that could be a good fit for CrowdStrike.
A recent Securities and Exchange Commission filing by Tenet Healthcare, a major Dallas-based healthcare delivery organization, provides the latest public peek into the hefty impact a disruptive cyber incident can have on a healthcare entity's finances.
Federal regulators say credit unions should report cyber incidents within 72 hours, including those experienced by third-party vendors that process member data. Just five deposit, payment, and data processing service companies dominate the credit union market.
One Identity selected ex-LogRhythm CEO Mark Logan as its next leader and tasked him with standing the Quest subsidiary up as a stand-alone entity. The company offers identity governance, privileged access, identity management and Active Directory management solutions thanks to buying OneLogin.
Big, bad bugs - including the likes of Heartbleed, BlueKeep and Drupalgeddon - never seem to burn out. Instead, they just slowly fade away, despite the risk that attackers will successfully exploit them to steal data, seize control of systems or deploy ransomware.
Exploring new ways to offer security as a service from his organization to external customers is an exciting challenge and opportunity, says Sean Mack, CIO and CISO of publishing company Wiley. He also discusses aligning security investments with the company's biggest business risks and goals.
Getting cybersecurity right means CISOs need peer relationships with other operations executives. CISOs need board access and a handle on the company business, writes Ian Keller, director of security at a telecom company. "And then you'll wake up and realize this is not as simple as it sounds."
Three ISMG editors discuss important cybersecurity issues, including the sharp rise in Maui ransomware attacks, how the FBI seized cryptocurrency ransom payments worth $500,000 from North Korean attackers and advice for CISOs navigating the great zero trust debate.
Atlassian released a patch for a critical vulnerability in its workspace collaboration tool Confluence stemming from hard-coded credentials. The Australian company found no evidence of exploitation of the flaw that allows remote, unauthenticated attackers access to vulnerable servers.
The basic foundation of designing a reliable and dynamic cyber resilience program is to have an elaborate incident response plan that can take into account different cyberthreat scenarios and outcomes, says Singapore-based Christophe Barel, who is managing director for Asia-Pacific at FS-ISAC.
Compromised logon credentials are the root cause of most data breaches, especially because users tend to reuse passwords, says Vikas Malhotra. Passwords are not going anywhere, he says. The LastPass India country manager also discusses password management and managing identities.
With dozens of cybersecurity vendors offering solutions, today's zero trust debate is not about whether to do it but rather how to implement it. Some argue that firewalls and VPNs are dead while others caution against cobbling together new solutions. Experts advise to start small - but start now.
How does a zero trust architecture help reduce the risk of remote access to corporate networks? Ajay Kumar Dubey, channel director at Forcepoint, shares his views on why VPNS are no longer relevant. He also discusses implementing SASE and controlling access to cloud and private apps.
Researchers at BitSight say a common GPS tracker used in fleet management by organizations around the globe could be used by hackers to abruptly stop vehicles on highways or disable a car for ransom. Chinese manufacturer MiCODUS hasn't responded to researchers or U.S. officials.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.