Chris Hallenbeck, CISO for the Americas at Tanium, has led security and IT operations, incident response, endpoint detection and built and deployed teams for incidents of national security. What initiatives has he implemented as a CISO, and how does he gauge the success of his team?
In contrast to the competitions on Russian-language cybercriminal forums profiled previously by Digital Shadows, how are competitions on English-language cybercriminal forums more generally "innocent"?
Millions of U.S. businesses forced to rapidly support home working for employees are facing significant challenges to securely manage their IT networks, according to a new report from Tanium.
The best way to prevent scripting attacks, such as those that implement Python back doors or compromise PowerShell, is to implement identity-based zero trust. In a zero trust environment, IT treats the internal network as if it were the public internet, a place where nothing can be trusted, and anything can be a threat.
As China forges its role as one of the great world powers, it relies upon a blast furnace of espionage operations to acquire foreign technologies and intellectual property, better position itself against competing international powers and control its own image both at home and abroad.
As a result of the COVID-19 pandemic, more people than ever are working remotely. Because of this recent and rapid transition, users are accessing corporate resources from their homes and generating unprecedented amounts of network traffic. IT departments face increased pressure to ensure business continuity by providing remote users with access to essential corporate applications and services through Virtual Private Networks (VPNs), which are designed to provide access to private networks through shared or public networks.
While employees are the key to identifying cybersecurity vulnerabilities quickly, many companies have failed to create a welcoming environment for whistleblowers. During COVID-19, how can you safely blow the whistle?