In this special edition of the ISMG Editors' Panel, we honored the memory of industry veteran Steve King, managing director of CyberEd.io. His friend Richard Bird joined ISMG editors to share reflections on Steve's legacy, his contributions to cybersecurity, and the importance of questioning the status quo.
Jana Partners announced a "significant" stake in Boston-based Rapid7 on Wednesday and plans to push the vulnerability management firm to sell itself. The activist investor is working with investment firm Cannae Holdings and wants Cannae to team up with a private equity firm to buy Rapid7.
More reasons to beware breathless reporting about a ransomware group's latest supposed victim: LockBit's claim to have breached the U.S. Federal Reserve Bank. Instead, the actual victim is Evolve Bancorp, which is currently dealing with an enforcement action by - wait for it - the Fed.
Hackers behind the leak of 10 million records from Australia's second-largest telecommunications carrier Optus exploited a vulnerability the company unwittingly inserted four years earlier into a web portal access control, said the Australian Communications and Media Authority.
Never let ransomware become normalized. Businesses today are more likely that not to be hit by ransomware, but this doesn't mean we should ever let ransomware seem like a new normal, akin to death or taxes. We need expert business resilience and failover capabilities.
To obtain a leadership role, consistently show your commitment to the field, your willingness to help others and your ability to effectively communicate and solve problems. By doing so, you can build a reputation as a knowledgeable, proactive and reliable leader in cybersecurity.
Multifactor authentication is a must-have security defense for repelling outright credential stuffing and password spraying attacks. But no defense is foolproof. Attackers have been refining their tactics for bypassing MFA, including using technology and trickery.
Chief Information Security Officers (CISOs) face unprecedented challenges in their efforts to protect their organizations against a rising tide of increasingly sophisticated cyberthreats.
An independent security researcher discovered a critical flaw in the backend infrastructure of the largest broadband provider in the United States that, if exploited, could have left millions of business customer devices vulnerable to major cyberattacks.
LinkedIn recently released its list of the top companies to work for in 2024. Securing a technical position at a top company requires a strategic approach. Here are some practical tips to help you get started on landing your dream job in tech.
Can individuals' personal data and content be used by artificial intelligence firms to train their large language models without requiring users to opt in? The answer may vary by geography, but even in Europe it so far appears to be "yes," provided vendors practice transparency with users.
Hollywood megastar Scarlett Johansson said a voice built into OpenAI's new GPT-4o is "eerily similar" to her own, despite her declining the company's request to lend it her voice. While AI firms have a penchant for moving fast and breaking things, how far can their appropriation go?
Institutional knowledge, often referred to as tribal knowledge, plays a pivotal role in the success and continuity of any organization. Here are several strategies and practices chief information security officers and chief information officers can use to maintain institutional knowledge.
API security is a critical concern in today's interconnected world. Rupesh Chokshi, senior vice president and general manager, application security, Akamai, shared insights into the recent acquisition of Noname Security driven by the increasing adoption of APIs in the digital economy.
The fifth annual Sophos State of Ransomware Report combines year-on-year insights with brand-new areas of study. It includes a deep dive into ransom demands and ransom payments and shines new light on the role of law enforcement in ransomware remediation.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.