Recently CybelAngel CEO, Erwan Keraudy, and CRO Jeff Gore, sat down with Mathew Schwartz, Executive Editor of DataBreach Today to discuss ways for businesses to protect their growing external attack surface.
Art Coviello, former CEO of RSA and current partner with Rally Ventures, describes the cybersecurity industry trends he's watching closely as we hit the midway point of 2022, as well as which emerging technologies have not quite evolved in the way he might have anticipated.
To advance a more inclusive and diverse workforce in cybersecurity, it is imperative to consider "every person in the room," says Michael Cunningham, vice president and CISO of Graphic Packaging International LLC. He discusses ways for organizations to become more inclusive and diverse.
As the dwell time between when hackers compromise a system and when they trigger a ransomware attack has grown, victims have a little more precious time to detect and stop these attacks "before the worst happens," says Chet Wisniewski, principal research scientist at Sophos.
Continuing ransomware trends are making it increasingly important for organizations to proactively and comprehensively consider what cyber recovery means, says Jessica Hetrick, senior manager of cyber strategy at Optiv. She discusses the need to focus on recovery and resiliency.
To manage risks, it is essential to take into account a larger ecosystem: that is, who are the critical suppliers outside the company and how they interfere in operations, says Fernando Madueira, global CISO at Cosan Group.
One of the biggest difficulties for CISOs these days is keeping track of the location of all their data and critical assets as the attack surface grows, says Tom Powledge, Chief Product Officer at Trustwave. He says managed detection and response offerings can simplify the complex IT environment.
Sometimes timing is very important, and companies need to start managing risks, because nowadays those who do not have this capacity cannot evolve or innovate, says Glauco Sampaio, CISO and senior executive of privacy at Cielo, in a video interview with Information Security Media Group at RSA Conference 2022.
Cybersecurity demands and risks have increased at a very high rate due to the recent transformations faced around the world. As a result, the development of cybersecurity professionals in the area has not kept up with these needs, says EDP Brazil CISO Milton Almeida.
In the wake of digital transformation and President Biden's 2021 cybersecurity executive order, an entire industry has sprung up around the concept of Zero Trust. John Kindervag, the researcher who created the architecture, weighs in on how the discussion has evolved.
The broadcast of the Football World Cup 2022 qualifier game between Wales and Ukraine on Sunday was interrupted in Ukraine by a cyberattack that targeted OLL.TV, a Ukrainian online broadcaster. Traffic was rerouted to a Russian propaganda-based channel, the SSSCIP says.
The U.S. is on "borrowed time" for a major cyberattack that could potentially seriously disrupt critical infrastructure, but the nation can secure its systems and resources to avoid such cybersecurity disasters, says Rep. Eric Swalwell, D-California.
Abnormal Security is out with new financial crimes research, and it shows that traditional business email compromise is evolving into new forms of financial supply chain compromise. Crane Hassold shares insights on the crimes and how best to detect, deter and respond to them.
Cyberwarfare has emerged as the bridge between espionage and kinetic conflict. "It's here," says Chase Cunningham of Ericom Software. He discusses how enterprise cybersecurity leaders should now think more deeply about their adversaries' motivations and capabilities.
A cyberattack on the municipality of Palermo, which began on Thursday, reportedly continues to cripple the southern Italian city on Monday. The attack caused the municipality's systems and dependent services to be shut down and isolated, and local citizens and tourists alike have been affected.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.