To more effectively reduce risk and capitalize on the capabilities, intelligence and experience of both the corporate application security team and the product security team, John Scimone, Dell Technologies Chief Security Officer, recommends converging these programs. Once converged, the security organization will see immediate benefits. Here, Scimone explores why organizations should converge these teams and the benefits.
Threat actors are now not only encrypting critical business systems, but also backups. They’ve brought businesses to a standstill, leaving some non-operational and really, with no good options for recovery. In many cases, it’s been pay the ransom to obtain a decryption key — or go out of business.
Throughout the pandemic, the payments threat landscape was largely influenced by the ongoing COVID-19 pandemic. Cybercriminals continued to employ tried and true methods, such as phishing, payment account enumeration, eCommerce skimming, ransomware, among others to exploit many vulnerabilities during the pandemic, says Natalie Kelly, Visa’s SVP, Global Head of Payment Ecosystem Risk. Here, we talk to Kelly about the payments fraud ecosystem, her role at Visa, ensuring business continuity through the evolution of the payments threat landscape and more.
Some opportunistic cybercriminals have taken advantage of the pandemic environment to breach both consumer and organizations’ data. These cybercriminals are using COVID-19-themed emails as an opportunity to unleash ransomware attacks on organizations and consumers. Here, we focus on Remote Workforce and Remote Learning as areas that cybercriminals will continue targeting in 2021 and beyond, and explore mitigation strategies that may help reduce cybersecurity risks related to these areas.
The demand for touchless solutions is so great right now that the touchless sensing market across all sectors is expected to grow an average of 17% annually through 2025, according to Orion Market Reports, which states that the main drivers are increasing demand for non-contact detection, sanitation issues, and advantageous programs distributed by governments.
Here are steps you can take to protect your enterprise against ransomware, limit the impact of a breach, understand where an attack can be stopped, and act fast if a hacker succeeds in gaining access.
The pandemic exposed the need for hospitals to shore up security fundamentals and infrastructure, re-think incident response plans, and use tools rationalization to reduce coverage gaps.
For years, healthcare providers lagged their corporate counterparts when it came to cybersecurity. Recently, they made up significant ground, recognizing the need to allocate sufficient funds, focus on fundamentals, and outsource functions they cannot cost-effectively perform in-house. Unfortunately, 2020 threw a huge wrench in the works.
The ethical issues that exist around the wake of discovered security vulnerabilities are vast and murky. Far too often, the conversation about how and when to disclose security weaknesses shifts from a dialogue to a one-way monologue. What's a security leader to do?
Streaming - and really all content creators and consumers - would not have accelerated as it did without that much-needed bandwidth. In much the same way, we see the idea of Zero Trust Network Security, introduced more than a decade ago, needing its own boost for more widespread adoption. That help has arrived in the form of Secure Access Service Edge (SASE), the ideal framework for Zero Trust.
Barak Tawily, Chief Technology Officer and Co-Founder of Enso Security, argues that most AppSec teams today spend most of their time creating relationships with developers and performing operational and product-related tasks — and not on application security. Here, we talk to Tawily about AppSec and why enterprise security should be concerned with AppSec.