About 93 percent of external organizations reported malicious actors attempting to impact data backups, and 73 percent saw attackers be at least partially successful.
When it comes to security today, there is a difference between widely held beliefs and what is really happening on the front lines. With attacks not...
The "shift left" movement puts "unrealistic" expectations on developers, said Gayatri Prakash, vice president and general manager of compliance at CloudBees. She said installing new tools to manage various parts of the SDLC is not necessarily "going to solve our problem for security."
In the latest weekly update, ISMG editors discuss how the Feds have dismembered Russia's 'Snake' cyberespionage operation; the ongoing debate over privacy laws and regulations in the APAC region; and why more companies are banning the use of generative AI tool ChatGPT.
A hacker made $34 million from MEV bot attacks, NYDFS penalized Bitflyer for lax cybersecurity, Ishan Wahi was sentenced in the Coinbase insider trading case, the IRS is training Ukraine in blockchain forensics and the New York AG proposed a crypto cybersecurity bill.
Akamai will shrink its workforce by 3% as its shifts resources from its shrinking content delivery business to growth areas in cloud computing and security. The company will shrink its 9,960-person staff by 299 positions as it looks to sustain its profitability levels despite economic headwinds.
The cybersecurity industry is undergoing profound and rapid change, said John Chambers, the visionary former CEO of Cisco Systems who has turned venture capitalist and predicts the market will soon demand an outcome-focused architecture - not products - to underpin next-generation tech.
A U.S. federal appeals court sided with a company that simulates iPhones for security researchers after Apple sued, claiming copyright infringement. The court dismissed a claim that the company had infringed its copyright over iOS and remanded two other claims related to icons and wallpapers.
What are the challenges facing the U.S. financial sector as it continues its enthusiastic embrace of cloud-based technology? Department of the Treasury Deputy Assistant Secretary Todd Conklin said the agency has been "doing the best we can to secure cloud" as firms increasingly adopt it.
As Bugcrowd helps OpenAI keep pace with the inevitable cybersecurity risks amid the massive popularity of its applications, the bug bounty firm's CEO discusses the unique elements of finding vulnerabilities in OpenAI, its impact and the journey so far.
The ever-expanding threat landscape and the continued talent shortage mean defenders increasingly need to be ready with the skilled talent to face the onslaught of cybercriminals, who are gaining momentum by employing new tactics, according to Pamela Nigro, ISACA board chair.
Many longtime employees have retired,...
How many fires are you putting out before your first cup of coffee? How many before lunch? Why is it that security professionals seemingly can’t start their mission until 3pm? Prioritizing which parts of your business need to be fixed first is daunting and your day is likely preempted by account lockouts, breaches...
Most healthcare workers don't check security protocols before trying out new generative AI tools such as ChatGPT, putting patient and other sensitive data at risk, said Sean Kennedy of software vendor Salesforce, which recently conducted research on potential security gaps in healthcare settings.
The arrival of hyper-automation in Australia's public security sector brings both opportunities and challenges. As we embrace artificial intelligence (AI) and automation, it is crucial to consider their impact on the workforce and society. To ensure a fair and inclusive future, careful consideration and the pursuit of...
OT security is being discussed in the board room as attackers adopt the use of AI and automation. Many organizations never fully implement the frameworks that define OT security maturity, and we need holistic solutions and platform approaches that address the operator's needs.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.