According to the “Vectra 2019 Spotlight Report on Ransomware”, recent ransomware attacks have cast a wider net to ensnare cloud, data center and enterprise infrastructures.
Governor John C. Carney, Jr., signed House Bill 174 (“HB 174”) into law, or the Delaware Insurance Data Security Act, which establishes a comprehensive regulatory framework requiring insurers licensed to do business in Delaware to implement information security programs, report data breaches in a timely manner to the Commissioner and consumers, and empowers the Department of Insurance to investigate violations of the Act and levy penalties accordingly.
CSOs and CIOs ranked cybersecurity transformation as one of the most challenging aspects of cyber risk management that are related to the entire infrastructure.
Researchers rank data breaches, system misconfigurations and poor security architectures as the top three threats facing cloud platforms in a new report, Top Threats to Cloud Computing: Deep Dive.
Grant Bourzikas has been named Group Chief Information Security Officer (CISO) at HSBC Bank Plc, a banking and financial services organizations with 7,500 offices in more than 80 countries.
The United States Government Accountability Office (GAO) says it found 23 federal agencies lack proper cybersecurity measures to address oncoming challenges for the 2020 Presidential Election in a new report.
A California-based consumer-advocacy group is putting it in starker terms, suggesting a mass cyberattack against such vehicles could lead to Sept. 11-level casualties.
What happens online sometimes manifests as a real-world threat. Real-world threats are typically planned, referenced or originated online. Understanding the convergence between online behavior and real-world actions is increasingly important in the corporate security field. Here’s how security professionals can think about identifying and understanding threats in a society that increasingly straddles the virtual and physical worlds.
The relentless bombardment of cyber-attacks, and the fear of a breach and all that entails, have led to some rather dramatic changes in the Chief Information Security Officer position recently. It has long been considered the corporate hot seat, where job security is a misnomer and the average tenure is less than two years. That may still be true for many, but changes are happening that are finally allowing the CISO to emerge from the shadows of the IT department.