In the latest weekly update, three editors at Information Security Media Group discuss important cybersecurity issues, including the latest ransomware trends, plus an update on NIST's "zero trust" initiative.
Collaboration and information sharing among stakeholders - and influencing them to take a proactive approach to cybersecurity - are critical steps in fighting against cyberthreats, says Narendra Mainali, CISO of NIC Asia Bank of Nepal.
To recruit and retain cybersecurity specialists, organizations must "stop expecting people just to be sort of 'focused monkeys' and doing one particular task and turning the handle," says Keith Martin, professor of information security at Royal Holloway University in the U.K.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the use of commercially available spyware and security risk management in the telecom sector.
Building business resilience through a "zero trust" approach requires role-based authentication, user access velocity checks, and monitoring people, processes, and technologies, a panel of experts says.
Like many CISOs, Lisa Tuttle of SPX Corp. spent years trying to raise the corporate profile of her cybersecurity organization. Now, in the wake of so many high-profile attacks, she has senior management's full attention. The challenge: How do you maintain influence?
The U.S and its allies formally accusing China of cyberattacks on Microsoft Exchange servers comes as no surprise because it's "indicative of the behavior of the administration in China for many years now," says Cybereason CSO Sam Curry.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the challenges ahead for the new director of the U.S. Cybersecurity and Infrastructure Security Agency and vendor security risk management in the healthcare sector.
Lt. Gen (retired) Rajesh Pant, the national cybersecurity coordinator at India's Prime Minister’s Office, explains in an interview why the government is requiring telecom service providers to only use equipment that’s been certified as trustworthy.
In the latest weekly update, a panel of Information Security Media Group editors discusses the repercussions of the Kaseya ransomware incident, the immediate response of the cybersecurity community and key risk management takeaways.
CISO Gary Hayslip prides himself on being a mentor to up-and-coming cyber pros. But he also takes leadership roles in two causes that don't get nearly as much attention: stress management and building a more neurodiverse workforce.
It was stealthy, and it was widespread. But perhaps the Kaseya VSA ransomware attack wasn't quite as effective and damaging as initially feared, says Michael Daniel, president and CEO of the Cyber Threat Alliance. He explains where defenses succeeded.
The Kaseya VSA ransomware attack was discussed exhaustively over the Fourth of July holiday weekend. But there's one big question that hasn’t been answered, says Tom Kellermann, head of cybersecurity strategy at VMware Carbon Black: "Who gave REvil the zero-day?"