Alberto Hasson, the CISO at ICL Group, discusses how to avoid becoming the next victim of a ransomware or other malware attack. He outlines what defenders can do to close gaps in their defense strategies and how they can mitigate attackers' ever-evolving tactics.
In this episode of "Cybersecurity Unplugged," Tim Danks of Global Risk Perspectives discusses issues around trusting our global supply chain, including the role of Huawei, the steps needed to secure critical infrastructure, and the process for determining a comfortable level of risk management.
Never have global financial institutions
faced such adversaries. The cybercriminal gangs now wield tools that
used to be the province of nation-states, and the nation-states now
engage in activities that once were owned by cybercrime. Scams
and schemes including account
takeover, denial of service and ransomware...
Dennis Leber, CISO and CTO at the University of Tennessee Health Science Center, says cybersecurity is not just a profession - it's a lifestyle. And as he leads this life, he finds one of today's biggest cybersecurity threats is not ransomware or IP theft - it's "the buzzword mentality."
CyberEdBoard executive member Archie Jackson says security needs to be embedded by design at the inception of a project. He discusses how SASE is networking plus security plus identity and outlines how Network as a Service and Network Security as a Service combine to create SASE.
Cyber attackers have skills well beyond traditional information technology (IT) intrusions
and data exfiltration techniques—and they have set their sights on operating technology
(OT) environments. They have demonstrated an understanding of industrial control
systems (ICSs) and have an impressive ability to...
A global, integrated oil and gas company operating across five continents is using digital
transformation to grow its business, enter new markets and be more competitive. Critical
to this effort is a cloud-based digitalization initiative to enable advanced analytics and
decision-making, fueling greater efficiency,...
Now more than ever, chief information security officers (CISOs) are expected to weigh in on board-level decisions. In an increasingly competitive landscape, business acumen has become just as important as technical know-how, and executives rely on the CISO to map security programs to business objectives to promote...
In this edition, four ISMG editors discuss important cybersecurity issues, including how virtual currency Monero is becoming the main alternative to Bitcoin as the crypto choice for criminals, the challenges involved in an identity-centric Zero Trust approach and how to influence change in culture.
In this episode of "Cybersecurity Unplugged," Roger Sels, vice president, solution, EMEA at BlackBerry, discusses the global threat landscape one year after SolarWinds, including cyberthreats from Russia and China; the cyber impact of the Russia-Ukraine war; and the cyber call to action.
Harold Moss, the CEO of Tautuk, has a background in building products, but many in cybersecurity do not come from a product background. In this interview with Brian Barnier, he discusses the importance of context, listening and collaboration for teams to understand creative and critical thinking.
Eighty percent of survey respondents say they either are well on the way or getting started toward becoming a "smart manufacturing company." Cloud migration, business resiliency and securing OT environments are among their priorities. Del Rodillas of Palo Alto Networks analyzes the survey results.
Fifty-three percent of survey respondents say cyberthreats became fiercer during COVID-19, and 17% say the pandemic disrupted their data security initiatives. These are among findings of a new survey sponsored by HelpSystems. Cary Hudgins analyzes the results and discusses how to put them to work.
Michael Lines is working with ISMG to promote awareness of the need for cyber risk management. As a part of that initiative, CyberEdBoard posts draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself." This chapter is "Recognize the Threats."