A look at a Russian-speaking hacker offering novice cybercriminals a cheap way to conduct ransomware attacks leads the latest edition of the ISMG Security Report. Also, hear U.S. Homeland Secretary John Kelly address the cybersecurity challenges the federal government confronts.
The latest chapter in the nonstop WikiLeaks saga: As U.S. government officials continue to ramp up their anti-WikiLeaks rhetoric, President Donald Trump has reportedly directed federal prosecutors to examine ways in which members of WikiLeaks could be prosecuted.
The IRDAI requires all insurance organizations to appoint a CISO soon and expects them to formulate a cyber crisis management plan as an immediate step. Security leaders discuss the feasibility of meeting IRDAI's deadline.
The ransomware epidemic can be compared to the earlier heyday of viruses, albeit it is costing enterprises and individuals serious money. Charanjit Sodhi of Nomura Services takes a deep dive into the tactics used today and how enterprises can effectively counter them.
Despite a slew of measures announced by the Modi government last year to encourage cybersecurity startups in the region, security experts argue that converting these plans to actionable policies and creating demand has proven difficult.
New York has become the first US state to issue its own set of cybersecurity rules for financial institutions. What is the potential impact on other states, other industry sectors? Paul Bowen of Arbor Networks shares insight.
Bryce Austin, a former technology lead at Target during the retailer's massive November 2013 breach, says the role of the CISO needs to evolve, ensuring that cybersecurity is balanced with the overall needs of the company. He claims tying the CISO's performance to the company's revenue is the best way to do that.
New documents dumped online by the Shadow Brokers group have revealed apparent NSA programs designed to target SWIFT service bureaus in the Middle East as well as a slew of exploits designed to infect Windows systems, patched last month by Microsoft.
The FDA has warned Abbott that it must submit a plan within 15 days to address previously identified cybersecurity vulnerabilities and other potential safety issues in certain cardiac devices of St. Jude Medical, which Abbott Labs acquired in January.
Good news for Microsoft Windows users: The Equation Group exploit tools dumped this month by Shadow Brokers don't work against currently supported versions of Windows, largely thanks to patches Microsoft released in March. But who tipped off Microsoft?
An investigation into last year's attempted theft of $170 million at India's state-owned Union Bank has found strong similarities with the Bangladesh Central Bank heist, which was attributed to North Korea, and resulted in an $81 million loss.
In October 2016, IBM commissioned Forrester Consulting to evaluate the means by which enterprises are managing and securing various endpoint form factors today and how strategies will change over the next three years. In conducting an in-depth survey of 556 IT and security leaders in the US, the UK, Germany, India,...
Seasoned InfoSec leader Sapan Talwar discusses the differences within global organizational culture with respect to security and India, with specific emphasis on incident response and mobility, sharing his recommendations, insights.
Unified Endpoint Management affords you the opportunity to put your expensive and ineffective multi-solution dependencies behind you.
While UEM is valuable, it is just another tool. A better tool, but a tool nonetheless. UEM needs something else to make it invaluable.
When used in combination with cognitive...