SAIC CIO Nathan Rogers on moving past the office-centric mentality

SAIC CIO Nathan Rogers on moving past the office-centric mentality

When the pandemic hit, Science Applications International Corporation (SAIC), like most companies, went from an everyone in the office company to an everyone remote company overnight. In the intervening years, the company has embraced the opportunity to rethink its culture, putting flexibility, well-being, and inclusion at the core, says Nathan Rogers, SVP of Infrastructure Enablement and CIO at the Fortune 500 provider of government services and information technology. It’s the flexibility piece that he says…

Read More

Q&A: Empowering agile beyond IT at Fannie Mae

Q&A: Empowering agile beyond IT at Fannie Mae

CIO is the seventh title Ramon Richards has held at Fannie Mae, a leading source of financing for mortgages in the US. The latest promotion came in August 2021 for Richards, who is in his 23rd year with the company. I recently spoke with Richards to learn about the technology and business transformation under way at Fannie Mae, and to get his perspective on the future of the CIO role. What follows is an edited…

Read More

No More Ransom Has Helped Over 1.5m Victims

No More Ransom Has Helped Over 1.5m Victims

The No More Ransom project celebrated its sixth birthday this week with a reminder of how far the initiative has come and the scale of its achievements over that time. It claimed to have helped over 1.5 million victims to successfully decrypt their devices without resorting to pay their extorters. No More Ransom now offers 136 free tools for 165 ransomware variants, including Gandcrab, REvil/Sodinokibi, Maze/Egregor/Sekhmet and many more. This list is continuously expanding thanks…

Read More

The Log4j Vulnerability: What Should Healthcare Organizations Do Next to Protect Patient Data?

The Log4j Vulnerability: What Should Healthcare Organizations Do Next to Protect Patient Data?

In April, CISA advised organizations to continue identifying and remediating vulnerable Log4j instances within their environments and plan for long-term vulnerability management. In June, CISA released a joint advisory to warn network defenders that threat actors have continued to exploit Log4Shell in VMware Horizon and Unified Access Gateway servers to obtain initial access to organizations that did not apply available patches or workarounds.  Cybercriminals continually seek new workarounds as patches are released, meaning the Log4j…

Read More

Data Breach Costs Reach New Record High

Data Breach Costs Reach New Record High

The average cost of a data breach globally now stands at $4.35m, up nearly 13% on 2020 figures and a new all-time record, according to IBM. The tech giant’s annual Cost of a Data Breach Report, now in its 17th year, was compiled from interviews with 550 organizations in 17 countries breached between March 2021 and March 2022. Aside from the headline findings, which represent a 2.6% increase on last year’s report, the firm claimed…

Read More

Average cost of data breach surpasses $4 million for many organizations

Average cost of data breach surpasses  million for many organizations

Beyond the immediate costs of a data breach, almost half of the total costs occur more than a year after the incident, says IBM Security. Image: Adobe Stock A successful data breach is costly to the impacted organization not just in time, resources and reputation but in cold hard cash. In addition to the expense of detecting, mitigating and cleaning up after a breach, there are long-term costs that can plague an organization for months…

Read More

Trends To Ensure Cybersecurity In 2022

Trends To Ensure Cybersecurity In 2022

By Héctor Guillermo Martínez, President of GM Sectec With the arrival of the pandemic almost 2 years ago, it became clear that companies are increasingly vulnerable to attacks by hackers and cybercriminals. In this period, in particular, these incidents have occurred in large part due to the fact that most companies have had to work with their workforce from home, which has opened up a huge gap that cybercriminals have been able to exploit. Below,…

Read More

Is any organisation risk and data breach free? | The State of Security

Is any organisation risk and data breach free? | The State of Security

I walked into a business the other day. After a long conversation about the client’s need for cybersecurity and the implementation of the ISO27001 security standard, we talked about their risk appetite. “We don’t accept any risk. We’re risk-averse” said the CEO. But, is this achievable? Given the complexity of our modern world, with diversity in the people, locations, services and technologies, can any organisation be totally risk-free, and therefore, can any business be totally…

Read More

Apply a Zero Trust Security Model to Industrial Control Systems (ICS)

Apply a Zero Trust Security Model to Industrial Control Systems (ICS)

Challenges with applying zero trust Applying zero trust principles comes down to segmenting the network, using authentication technology to verify the requestor before making any service available, enabling secure point-to-point networking, and monitoring device and entity behavior. This breaks down where technological limitations prohibit these capabilities. Sensor ship with a built-in back door. These devices must be calibrated in the field. The engineer installing them sets the operating level when the device is installed. Many…

Read More

Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike

Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike

Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike Cyber Threats Gootkit has been known to use fileless techniques to drop Cobalt Strike and other malicious payloads. Insights from a recent attack reveal updates in its tactics. By: Buddy Tancio, Jed Valderama July 27, 2022 Read time:  ( words) Our in-depth analysis of what began as an unusual PowerShell script revealed intrusion sets associated with Gootkit loader. In the past, Gootkit used freeware installers…

Read More
1 2,816 2,817 2,818 2,819 2,820 4,083