John F. Banghart has spent 30 years in cybersecurity, and he appreciates the importance of creative thinking, upskilling and collaboration. Looking back on the Heartbleed vulnerability, Banghart said the incident demonstrates the need to address software supply chain risks causing problems today.
Beware a surge in attacks tied to a ransomware group called RansomHub that's recruited affiliates from down-or-out operations LockBit and BlackCat and successfully crypto-locked systems at more than 200 organizations nationwide, including critical infrastructure, the U.S. government warned.
Today's workforce is increasingly insisting on having employer-provided education and development opportunities. Learn why offering employees opportunities for education and development is both a retention strategy and a key component of a successful business strategy.
Europe faces unprecedented security challenges as organizations embrace digital change. That's why ENISA is focusing on critical areas to bolster Europe's digital defenses - supporting member states by enhancing their cybersecurity programs through legislation, exercises and comprehensive reports.
The owners of eSentire are exploring a potential sale that could value the company at about $1 billion and attract the interest of private equity firms. The company is hoping to command a valuation equivalent to more than seven times its annual recurring revenue of about $150 million.
Cybersecurity consulting encompasses a wide array of services and specialties, ranging from high-level strategic guidance to hands-on technical support. Discover the categories and learn how to position yourself as a trusted expert in the cybersecurity consulting field.
How many ransomware victims pay their attackers a ransom precisely to avoid having their names listed - or their stolen data dumped - on a ransomware group's data leak blog? We don't know, but leak site posts don't correlate well with security firms' telemetry data.
In cybersecurity, the playing field can change at any given moment, so grit and adaptability are essential traits. Leaders can help their team members cultivate these qualities so they can meet the demands of their careers and contribute effectively to their organizations' security efforts.
Social engineering, which involves manipulating individuals into sharing confidential data or performing actions that compromise security, is a big threat. As organizations realize the importance of addressing human-centric security risks, the demand for social engineering defense experts will rise.
The United States Coast Guard in recent years has started to offer a range of cybersecurity services designed to enhance protections for the marine transportation system, but a new report reveals private sector stakeholders are reluctant to use the military branch.
According to Fortinet's latest Global Skills Gap Report, 90% of organizations experiencing a breach in the past year can partially attribute the incident to a lack of cyber skills. Fortinet's Rob Rashotte offers insight on the report and tips for tackling the skills shortage and minimizing enterprise risk.
The cybersecurity field offers numerous opportunities to specialize and deepen your expertise in niche areas. Here are some sophisticated niches that offer advanced career paths for midlevel professionals and some avenues you can pursue to gain experience while building your portfolio and skills.
Steve King served in senior leadership roles in technology development and deployment for the past 25 years. He worked as author, serial startup founder, CIO, CTO, CISO, CMO and - most recently - a passionate campaigner for cybersecurity education at ISMG. King died June 27, 2024, after an illness.
Resilience, grit and adaptability are key traits for success in the professional world. But what happens when these qualities are put to the test? Unexpected events can shake us to our core and challenge our ability to persevere and adapt. Here's how to navigate such situations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.