Derek Abdine has joined Censys, Inc. as Chief Technology Officer (CTO). An accomplished researcher, advisor and evangelist to the security community, Abdine brings over 15 years of leadership experience in the computer security industry.
Cybersecurity is critically important in the healthcare industry. We’ve all seen the headlines about vulnerabilities disclosed, information leaked, and facilities disabled because of malware. Unfortunately, many organizations have unrealistic expectations of their security teams. These result in missed deadlines, friction with product teams, and an operational model that cannot scale and is ultimately doomed to failure. By understanding the correct functioning of a security group, organizations can reduce overall risk smoothly and effectively.
There’s a significant movement in cybersecurity right now that is seeing organizations approach the problem of cyber defense through the eyes of an attacker. T
Amidst this flurry of high-profile attacks comes National Cyber Security Awareness Month; a poignant reminder that, for hospitals and healthcare providers, cyberattack prevention and business continuity is truly a matter of life and death. Over the course of the pandemic, we have seen ransomware and phishing attacks against healthcare institutions — viewed by cybercriminals as vulnerable and profitable targets — dramatically skyrocket. But where, in an ever-evolving threat landscape, should healthcare organizations focus their attention?
To ensure the deployment of enterprise-class registrars and additional best practices, organizations need to establish what we can call a “Domain Security Council.” Through such a council, CISOs collaborate with corporate C-suite members to identify, implement and continuously monitor/improve upon domain security policies and procedures.
Among the Windows 10 vulnerabilities Microsoft announced yesterday, the "Bad Neighbor" vulnerability stands out, posing a potential nightmare scenario for enterprises. With a severity score of 9.8 out of 10, the remote code execution (RCE) vulnerability would allow an attacker to run malware or launch a denial of service (DoS) attack.
Despite 88% of cybersecurity professionals believing automation will make their jobs easier, younger staffers are more concerned that the technology will replace their roles than their veteran counterparts, according to new research by Exabeam.
How are threat actors so successful? They gather breached data and information from open sources – think social media profiles or even voting records – to build digital profiles of individuals with just a few clicks. This can then lead to, among other attacks, phishing scams such as business email compromise, potentially inflicting a significant financial toll on an organization.