Following the demise or disruption of both the LockBit and BlackCat - aka Alphv - ransomware groups, more attackers than ever before are choosing to work as lone wolves rather than under the banner of increasingly toxic brands - due to the risk they pose, ransomware watchers report.
How close are you to achieving Zero Trust? If you’re a CISO or other security leader, recent and forthcoming government mandates mean you urgently need an answer to this question.
While formal leadership is crucial, the influence of informal leaders within a team can also be effective. There are multiple ways you can step up to informally inspire team collaboration. It's a good way to contribute to your own career growth and to the overall success of the organization.
Successful cybersecurity requires integrating people, processes and technology. According to Tyler Zito, senior solutions architect at Expel, without well-defined processes and communication, even advanced technology and skilled personnel can't effectively secure the enterprise.
Cybersecurity incidents are not just technical problems. They are also major public relations challenges. Effective IT and cybersecurity leadership during a crisis can significantly affect your company's reputation, stakeholder trust and overall recovery - and have a big impact on your career.
Microsoft's statement that a faulty CrowdStrike update affected less than 1% of active Windows systems doesn't tell the full story, since large organizations in critical sectors make up a disproportionate part of the user base, as the outages in healthcare, transportation and banking demonstrate.
We can't overlook the human factor. The adoption of Zero Trust is a response to the vulnerabilities that human actions can introduce, and AI is expected to bring greater automation to help organizations achieve their cybersecurity objectives faster.
CEO Nick Schneider explains Arctic Wolf's success with MDR and ITDR services, highlighting the company's unique security operations cloud and concierge delivery model. He also discusses Arctic Wolf's rapid expansion across Europe, Asia and Australia/New Zealand.
Despite all the platformization buzz, there are very few vendors with market-leading capabilities in at least three disparate security technology categories. That could change if Google forges buys cloud security firm Wiz for a reported $23 billion just two years after buying Mandiant.
To make cybersecurity a business enabler, cybersecurity teams need to focus on opening things up in a secure fashion so that the functionality and productivity of the business can flourish. Hearst's Andres Andreu discusses the areas in which this can be done.
What will it take for victims of ransomware, extortion and other types of cybercrime to stop directly funding their attackers? The latest breached business to pay a ransom to its attackers appears to be AT&T, which reportedly paid Shiny Hunters over $350,000 for a promise to delete stolen data.
The financial services sector is a big target for cyberattacks because of the sensitive and valuable data handled by employees. Successful phishing attacks and careless data management practices within this sector can lead to data breaches, financial losses and reputational damage.
The theft of terabytes of Snowflake customers' data through credential stuffing hacks highlights how multifactor authentication shouldn't be optional for safeguarding accounts. Experts are calling on providers to build in more robust identity and authentication security features, at no extra cost.
Adlumin CEO Robert Johnston discusses the company's recent $70 million funding round, its global expansion and its solutions for ransomware and data exfiltration prevention. Here are the top bets Adlumin is making around cybersecurity protection for midmarket organizations worldwide.
What's the best strategy for exploiting a known vulnerability in ransomware to help victims decrypt their files for free? That question continues to recur as researchers discover such vulnerabilities and then must weigh whether or not to publicize the flaws, which tips off the ransomware operators.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.