While ransomware attacks are largely viewed as cybersecurity incidents, there are critical data privacy concerns that must always be top of mind, says Jodi R. Daniels, founder and CEO of privacy consultancy Red Clover Advisors.
The ransomware challenge facing organizations today traces directly to the success being enjoyed by gangs who wield such malware, says Palo Alto Networks' Jen Miller-Osborn, who describes new strategies to help disrupt this cybercrime business model, including the launch of the new Ransomware Task Force.
A new WastedLocker malware variant, dubbed WastedLoader, is exploiting two vulnerabilities in Internet Explorer to insert malicious advertisements into legitimate websites, the security firm Bitdefender reports.
Cybersecurity professor Ron Woerner defines “unfluence” as the negative side of influence. He describes the principles of influence and psychology and how black hat hackers use them on their victims - and how to defend against these tactics.
Allen Phelps, CEO of the security firm Trust Farm, reviews some of the tactics, techniques and procedures used by foreign influence threat actors to target research organizations and shares some best practices to defend against those threats.
Security researchers at FortiGuard Labs have uncovered another DarkSide ransomware variant with destructive capabilities. But the researchers say the variant is "unrelated to the Colonial Pipeline campaign" and no longer active.
In the wake of recent attacks on supply chains and critical infrastructure, Adrian Mayers says it's time for cybersecurity to be seen as an issue of national defense, and that cybersecurity leaders throughout the private and public sectors must embrace their role to protect national interests.
Colonial Pipeline Co.'s CEO, Joseph Blount, said Wednesday that he authorized the payment of a $4.4 million ransom just hours after the company was hit by a DarkSide ransomware attack, telling The Wall Street Journal, "It was the right thing to do for the country."
The Colonial Pipeline ransomware attack was every CISO's nightmare. And Roger Caslow of HRSD has faced a similar nightmare before. Caslow and Amit Basu of International Seaways weigh in on this recent attack, its significance and how ransomware defenses must change.
Cryptocurrency is gaining traction worldwide. But is it ready to displace the U.S. dollar as the world's reserve currency? Kathy Wang and Kenneth Geers of Very Good Security bring this topic to the RSA Conference stage and share exclusive insights in this panel discussion.
Attacks against Colonial Pipeline and other organizations have put ransomware at the top of conversations about cybersecurity. Megan Stifel of the Global Cyber Alliance believes new approaches are needed now.
What more can be done to disrupt cybercrime operations and embolden even tough-to-reach jurisdictions to take action against suspects? Craig Jones, director of cybercrime at Interpol, describes recent disruptions - for example, of Joker's Stash - and takeaways for combating today's top online threats.
Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
What do the world's leading encryption and security experts think about non-fungible tokens, supply chain attacks, coordinated vulnerability disclosure and the state of quantum computing? The cryptographers' panel at RSA Conference 2021 addressed all these issues.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.