Organizations in the middle east need to meet potentially conflicting demands to achieve secure business transformation – blocking more attacks, increasing visibility across endpoints, enhancing their breach defense strategy, while improving incident response times and boosting threat hunting capabilities.
When medical device makers provide a software bill of materials for components contained in their products, it's critical to make that voluminous security information actionable for healthcare customers, says Rob Suárez, CISO at medical device maker Becton Dickinson and Co.
Healthcare devices pose a huge risk to organizations and their patients, as they often ship with vulnerabilities, run unsupported operating systems, are difficult to patch and lack encryption in communication. Experts at Palo Alto Networks offer risk mitigation advice.
The global law enforcement "Anom" honeypot operation racked up impressive statistics for the number of criminals tricked into using the encrypted communications service. Psychology was at play: Officials say users flocked to the service after they disrupted rivals EncroChat and Sky Global.
For most organizations, the rationale for employing data security solutions is crisis mitigation associated with potential data breaches - driven by compliance regulations, possible fines and reputation loss. There is, however, another compelling rationale for strong data security program that a growing number of...
Endpoint Detection and Response (EDR) tools enable organizations to address the increased complexity and frequency of attacks by providing unparalleled visibility and detection across their endpoints.
Red Canary’s technical team keeps constant tabs on the EDR market, evaluates new technology, and has guided...
Bitcoin has enabled fast payments to cybercriminals pushing ransomware. How to deal with bitcoin is the subject of a spirited debate, with some arguing to restrict it. But bitcoin doesn't always favor cybercriminals, and it may actually be more of an ally than a foe by revealing webs of criminality.
How can endpoint security tools help in combating attackers who enter organizations by such stealthy means as "living off the land" attacks? In this Tech Spotlight, Adam Licata of Symantec, a division of Broadcom, discusses the new endpoint security challenges for cybersecurity leaders.
In an interview with...
With the RSA Conference virtual this year, ISMG replaced its two live on-site studios with a suite of home studios and produced a diverse group of interviews on timely topics with thought leaders who will be solving cybersecurity's most urgent problems.
A half-dozen security vulnerabilities recently identified in older versions of the Zoll Defibrillator Dashboard could allow an attacker to take remote control of device management, including executing arbitrary commands, as well as gain access to sensitive information and credentials, CISA warns.
Zero Trust, Firmware in the Supply Chain, and the Demand for Device Integrity
What does the Executive Order on Cybersecurity mean for security teams tasked with protecting endpoints, servers, and network devices? Download this report from Eclypsium to learn new Zero Trust requirements, their implications for device...
How much trust can you put in your devices?
Security concepts like Zero Trust can provide an essential framework for securing the remote work environment and your supply chain from attackers.
Download this guide from Eclypsium to learn:
How attackers capitalize on blind spots in device security
The prolific Avaddon ransomware-as-a-service operation has announced its closure and released 2,934 decryption keys for free. Has the increased focus by Western governments on combating ransomware been driving this and other operations to exit the fray?
Criminals tricked into using an FBI-run encrypted messaging app, Verizon's 2021 Breach Investigations Report and overcoming the challenges of recruiting cybersecurity professionals are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.
Weeks after VMware issued patches to address vulnerabilities in its vSphere Client (HTML5), threat intelligence firm Bad Packets says threat actors are mass scanning for vSphere hosts vulnerable to remote code execution.