Despite a company’s belief on how it would respond in the event of a ransomware attack, companies should consider opening a bitcoin account with a nominal amount of bitcoin in it so that it is at least prepared to make the tough decision should the need arise.
Sukumar Reddy Saddi has been named Global Integrity Finance's Chief Technology Officer. Saddi will lead the company's end-to-end information technology strategy and development of financial applications.
(ISC)² published a new research study highlighting the unique challenges diverse cybersecurity professionals worldwide face and provides recommendations to create positive change.
LendingHome, a real estate loan provider, has named Carrie Weber their new Chief Risk Officer. Weber will develop a risk management strategy for the firm and oversee risk and compliance issues.
The recent pandemic accelerated a trend towards remote work that has been ongoing for years and, as a result, accelerated usage of cloud-based collaboration platforms and their impact on the field of digital forensics. This article will discuss the trends and challenges associated with these platforms as they pertain to cloud-based data collection and its use in forensic investigations.
We spend a lot of time and effort so we can spot attackers —
and for a good reason! But without visibility into our own organizations, we’re left with too much uncertainty. So how can you use more visibility to counter the fog of war?
CISA, the Federal Bureau of Investigation, the Environmental Protection Agency, and the National Security Agency have released a joint Cybersecurity Advisory that details ongoing cyber threats to U.S. Water and Wastewater Systems Sector.
The Identity Theft Resource Center's data breach analysis for the third quarter of 2021 has been released, highlighting an uptick in breaches compared to the first half of the year. The U.S. is set to break its own record for most data breaches in a year in 2021.
A recent surge in cyberattacks, including SolarWinds and Colonial Pipeline, has intensified a focus on cybersecurity across industrial sectors and critical infrastructure. As a result, the U.S. government and other organizations within the nation’s defense supply chain have taken action to protect the critical assets and organizations that ensure the security and prosperity of our country.
Like many other security processes, penetration testing and threat hunting are often incorrectly equated. However, the difference between the two is that between prevention and detection.