Microsoft has released an "out of band" security update to fix a flaw in SMBv3 that was accidentally disclosed publicly before a full fix had been prepared. Security experts warn that the flaw could be exploited to crash vulnerable systems and potentially execute arbitrary code.
The latest edition of the ISMG Security Report offers an analysis of cybersecurity and privacy issues raised by COVID-19 research efforts. Also featured: the latest ransomware trends and an investor's take on hot cybersecurity sectors.
The new Cyberspace Solarium Commission released its highly anticipated report this week that offers more than 75 U.S. cybersecurity recommendations and calls for sweeping reforms. Here's a look at the key proposals.
The RSA cybersecurity conference once again this year gathered tens of thousands of individuals to network and attend keynotes and briefings on topics ranging from election security and genomics to privacy and cybercrime. Here are 20 visual highlights from this year's event.
Supply chain risk, security in the cloud, zero trust - these were three of the hottest topics at RSA Conference. And they were discussed candidly - and with some humor - when thought-leaders Edna Conway and Wendy Nather entered ISMG Studios.
The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation. The bad news: Visibility and governance take a huge hit. Matt Kraning, CTO and co-founder of Expanse, discusses this challenge and how to improve cloud governance.
Mobility, connectivity and the infrastructure-less IT environment - they add new degrees of difficulty to cybersecurity. Michael Covington of Wandera shares strategies for securing this modern workplace.
Do CISOs need to have deep technical proficiency? Many information security professionals will say: "Of course." Ask them which skills rank highest, however, and you'll hear words such as "communication" and "building trust," says Thom Langford, director of (TL)2 Security.
No advanced hacking skills required: The burgeoning cybercrime-as-a-service economy continues to make it easy for aspiring cybercriminals to procure highly automated, easy-to-use and effective attack tools to fuel illicit profits, says Liv Rowley, a threat intelligence analyst at Blueliv.
For the past year-plus, RSA and ISMG have teamed up for a series of North American cybersecurity roundtables dedicated to digital risk management. RSA's Ben Smith shares highlights of discussions about third-party risk, privacy and multi-cloud transformation.