These aren’t cookies. These are clever, hidden scripts that you can only detect from the web browser, and they can contain...
Control is the lifeblood of an effective information security program, but fully locking down endpoints is impossible, not least in the open environment of a public university, says Robert Hellwig, CISO of Germany's University of Siegen. In this exclusive discussion, he recommends approaches.
As the landscape of brand protection evolves, learn what organizations can do to protect themselves from losing prospects, brand affinity, and customer loyalty to cybercriminals who impersonate their brands to scam customers and prospects.
Discover how digital transformation is impacting cybersecurity – and how IT decision makers are responding. The report also looks at the steps organizations can take to bake security into digital transformation efforts, embrace automation, and integrate solutions through an API Ecosystem. All to help leverage the...
Two trends that have only grown over the past two years: Hybrid workforce and adoption of the zero trust architecture. Peter Newton of Fortinet shares how zero trust network access is now key to helping ensure security with workers now balancing on-premise and remote work.
On Tuesday, Ireland's Data Protection Commission imposed an $18.6 million penalty on tech firm Meta. That same day, the privacy watchdog was sued by a member of the nonprofit Irish Council for Civil Liberties over its "prolonged inaction" in the Google data breach case.
Video game developer Ubisoft has confirmed that a cybersecurity incident caused temporary disruption to some of its games, systems and services, and the ransomware gang Lapsus$, which was behind the breaches at Samsung and Nvidia, is implying that it may have been responsible.
Data privacy is top of mind early this year, but it comes loaded with questions. Is it a CTO or CISO problem? Does securing data make it both beyond the reach of bad guys and hard to use for businesses? Manish Ahluwalia answers these and other key data privacy questions.
In this interview with Information Security...
Jameeka Green Aaron, CISO of Auth0, says, "We're not protecting technology; we are protecting people." Because of that, she is a strong proponent of "privacy by design" in security controls, and she strongly advocates for viewing fraud and privacy together - not separately.
In an interview with Information Security...
Ukrainian online newspaper Pravda has published what it says are details on 120,000 Russian soldiers, citing Ukraine's Center for Defense Strategies as the source. But chatter seen by Information Security Media Group on Telegram suggests that the source of the dataset is the hacker group ENIGMA.
Many of your coworkers are at home, where they will continue to work
permanently. Others will shuttle back and forth between home and office
in a hybrid work pattern.
Moving forward, with President Biden’s Zero Trust cybersecurity mandate in
mind, you need to come up with a comprehensive game plan to...
Protecting agencies from cyberattacks is imperative. At
stake is the safety of classified and personal information
as well as avoiding ransomware, unplanned downtime,
and regulatory penalties. Yet sophisticated cyberattacks
continue nonstop, despite the time, money, and effort spent
to prevent them.