How many organizations fall victim to a ransomware outbreak? How many victims pay a ransom? How many victims see stolen data get leaked? A new study from the EU's cybersecurity agency ENISA offers answers, but carries major caveats due to rampant underreporting of such attacks.
Here's unwelcome ransomware news: When a ransomware victim chooses to pay a ransom, the average amount has increased to $228,125, reports ransomware incident response firm Coveware. On the upside, however, big-name ransomware groups are having a tougher time attracting affiliates.
The report from Israeli publisher Globes that CrowdStrike plans to spend $2 billion buying one or more Israeli cybersecurity companies sent shockwaves through the industry. Here's a look at six security startups with a large presence in Israel that could be a good fit for CrowdStrike.
Pooja Agrawalla says young people trying to enter the cybersecurity field should pursue fundamental skills instead of certifications. The global head of identity and access management at NXP Semiconductors also discusses her career challenges and how learning something every day keeps her going.
Nascent startups have ditched the "growth at all costs" mantra of 2021 to hold onto enough cash to weather the macroeconomic storm expected later this year. Gone are the days of security vendors promising to double annual sales while burning cash even faster than they bring in new business.
The biggest challenge facing security leaders is using security to enable business, says Agnidipta Sarkar, group CISO of Biocon. In the pharmaceutical industry, the business includes research, development, manufacturing, distribution and sales. He shares the areas to focus on for digital safety.
Exploring new ways to offer security as a service from his organization to external customers is an exciting challenge and opportunity, says Sean Mack, CIO and CISO of publishing company Wiley. He also discusses aligning security investments with the company's biggest business risks and goals.
Getting cybersecurity right means CISOs need peer relationships with other operations executives. CISOs need board access and a handle on the company business, writes Ian Keller, director of security at a telecom company. "And then you'll wake up and realize this is not as simple as it sounds."
Huntress has made the largest acquisition in its eight-year history, buying Curricula to boost user education. Huntress evaluated seven companies with security training tools and chose Curricula for its ease of use, manageability for smaller customers and enjoyable online learning experience.
Satyavathi Divadari's passion for continuous learning has helped the chair of the Cloud Security Alliance to grow her career in cybersecurity. Divadari discusses the advantage of working in multiple industries, her devotion to including women in cybersecurity and some of her career highlights.
To be cyber resilient, an organization needs visibility across the entire infrastructure landscape, says Venugopal Arcot, senior director and head of solution consulting at ServiceNow. He discusses including the board in security conversations and integrating enterprise data in one location.
The basic foundation of designing a reliable and dynamic cyber resilience program is to have an elaborate incident response plan that can take into account different cyberthreat scenarios and outcomes, says Singapore-based Christophe Barel, who is managing director for Asia-Pacific at FS-ISAC.
Future quantum computers will decrypt encrypted data, so businesses feel pressure to find quantum-resistant security solutions for data transmission. Wells Fargo Bank's Peter Bordow discusses the state of quantum computing, approaches to quantum security, and privacy-enhancing technologies.
CISO Richard Rushing of Motorola Mobility says that open-mindedness, innovation and a desire to learn are essential qualities for CISOs in order to build dynamic defense strategies to stay ahead of the attackers. He also discusses why partners are critical components in cybersecurity.
Ransomware attacks and data breaches: One thing both have in common is the challenge of attempting to accurately understand their true scale and impact. Too often, data breach notifications lack useful details, while ransomware attacks and ransom payments go unreported.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.