Nair previously worked at TechCircle, IDG, Times Group and other publications, where he reported on developments in enterprise technology, digital transformation and other issues.
A "road map to resilience" approach helps organizations balance immediate, low-cost security improvements with complex, long-term risk reduction initiatives in industrial control systems, said Mex Martinot, vice president and global head of industrial cybersecurity at Siemens Energy.
With 75% of cybersecurity leaders facing the worst threat landscape they've seen and 90% reporting workforce shortages, emotional intelligence has become crucial for effective leadership and team retention, said Tara Wisniewski, EVP of advocacy, global markets and member engagement at ISC2.
Healthcare has become the number one target for cyberattacks, with organizations spending an average of $11 million per ransomware incident, says Jojo Nufable, vice president at St. Luke's Medical Center. He shares why traditional security approaches fall short as AI-powered devices proliferate.
With the proliferation of IoT devices, organizations face mounting security challenges from varying security protocols and authentication methods. AI-powered automation emerges as a crucial tool for managing this complexity, said Philippe Bletterie, vice president at Alcatel-Lucent Enterprise.
As organizations rapidly deploy AI applications, many bypass crucial governance frameworks. This rush to implement without proper oversight creates significant compliance and security risks, said Tarun Samtani, advisory board member at International Association of Privacy Professionals.
Adopting standards like ISO 27000 can help organizations align with national security goals and regional cooperation, but simply following compliance checklists falls short, said Anthony Lim, fellow, cybersecurity, governance and fintech, Singapore University of Social Sciences.
Operators of a Russian-speaking ransomware group launched a new encryptor with enhanced measures for defeating cyber defenders including wiping logs, disrupting backup systems and stopping decryption without insiders knowledge. The same group disrupted London hospitals in a July attack.
Traditional technology risk frameworks may suffice for AI threats, but organizations must strengthen their approach to talent management and workforce resourcing to address emerging challenges in artificial intelligence deployment, said Jenny Tan, president, ISACA Singapore Chapter.
Traditional data center security approaches do not translate very well to cloud environments as cloud computing and Layer 7 applications have fundamentally changed the way organizations should implement security controls, said Traceable AI's Richard Bird.
A recently constituted and apparently well-resourced ransomware player is developing and testing tools to disable security defenses, including a method that exploits a vulnerability in drivers. Embargo first surfaced in April amid an ongoing shakeup in the ransomware world.
More incidents, vulnerability remediation timelines that can stretch into a year and mismatched budget priorities - such is the state of operational technology cybersecurity in 2024, according to participants in an annual SANS survey. Incident response remains a weak point.
In the evolving landscape of digital transformation, cybersecurity should become a reflex and not just a ritual. Security organizations need to promote cultural change in addition to security tools, said Milind Mungale, former CISO of Protean eGov Technologies Ltd.
The proliferation of data in today’s hyperconnected world presents both opportunities and risks. Rigo Van den Broeck, executive vice president of cybersecurity at Mastercard, said the sheer scale and accessibility of data require organizations to adopt proactive cybersecurity strategies.
Ivanti confirmed that hackers are exploiting an SQL injection vulnerability in its Ivanti Endpoint Manager enabling remote code execution, despite the company addressing the issue with a patch in May. The flaw allows unauthenticated attackers within the same network to execute arbitrary code.
Don't pull data from an operational technology network: OT networks should push data out. Segment critical OT networks. Don't introduce cybersecurity systems into an OT network unless administrators can guarantee they won't hinder a restart after a complete loss of electricity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.