As both a CISO and CTO, Tim Heger is in the unique position of shaping HealthBridge's approach to security as well as adopting new technologies to keep the organization on the cutting edge. In his spare time, he helps mentor and encourage startups.
Researchers at Trend Micro say that about 50,000 IPs have been compromised across multiple Kubernetes clusters in a wormlike attack by the cloud-focused cryptojacking group TeamTNT.
Diego Souza's main responsibility as the global CISO at Cummins Inc. is focusing on the gap between IT and OT security and effectively communicating risk and other security issues to the board. But his passion is developing and mentoring the next generation of cybersecurity leaders.
Carl Pei, co-founder of OnePlus, a smartphone company, said Tuesday that his Twitter account had been compromised via a third-party app called IFTTT and a tweet had been injected via his profile for an apparent cryptocurrency scam.
Iran is using its abundance of oil to generate electricity that powers a massive bitcoin cryptomining operation that enables the country to turn its greatest natural resource into money, offsetting some of its income lost as a result of economic sanctions, according to cryptocurrency analysis firm Elliptic.
Where were you on May 25, 2018? That was the day the EU's General Data Protection Regulation went into full effect. Three years later, some legal and privacy experts say that while the global privacy discussion and expectations have evolved, GDPR still has some growing up to do.
Experience as a chief enterprise architect offers excellent underpinnings for performing as a security leader, in that both roles require creating and executing a vision, backed by stakeholder buy-in and navigating obstacles - no matter the scarcity of resources, says Suren Naidoo, CISO of The Foschini Group.
"No risk, no business." As global CISO of Egyptian Arab Land Bank, Mohamed Mostafa says he regularly applies that maxim, which he learned from a prior boss, as he seeks to maximize his organization's security posture while working closely to collaborate with every line of business.
The U.K.-based insurance firm One Call says it has successfully restored its systems in a new environment that is separate from the one that was impacted by a ransomware attack May 13, adding that a ransomware note which purported to be from DarkSide could not be verified as authentic.
Healthcare went through five years of transformation over the course of 2020. How does this new telehealth focus most change how healthcare security leaders must view cybersecurity? Hank Schless of Lookout weighs in on remote services, connected devices and the cloud.
Drawing on her experience selling cybersecurity products and services, Nastassja Finnegan now sits in the hot seat, as CSO of South Africa's First National Bank. Succeeding in either role, she says, requires interfacing with users, understanding their needs and helping them to do the right thing.
Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts as a first step toward installing malicious Windows applications to harvest user and system information, according to a global report by McAfee.
As director of security for a telecom company, Ian Keller works to ensure customers have the latest knowledge and intelligence required to deploy the company's products in a secure and compliant manner.
Microsoft is warning about a spam campaign that uses an updated variant of Java-based StrRAT malware that steals confidential data while disguising itself as a ransomware infection even though it does not actually encrypt data.
Ransomware attacks are stuck on repeat: Criminal syndicates have found an extremely profitable business model, and they're milking it for all it's worth. So give the city of Tulsa, Oklahoma, credit for having in place robust disaster recovery capabilities and vowing to remediate, rather than pay criminals.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.