HackerOne Insider Defrauded Customers

HackerOne Insider Defrauded Customers

A former employee at HackerOne used their access to sensitive information at the bug bounty platform to generate personal profits, the firm has revealed. The unnamed individual’s system access was terminated just 24 hours after a tip off from a customer revealed they had “improperly accessed information in clear violation of our values, our culture, our policies, and our employment contracts.” The firm analyzed internal logs and found that the then-employee, who had access to…

Read More

How Cairn Oil & Gas is using IT to overcome one business challenge after another

How Cairn Oil & Gas is using IT to overcome one business challenge after another

Cairn Oil & Gas is a major oil and gas exploration and production company in India. It currently contributes 25% to India’s domestic crude production (about 28.4 MMT) and is aiming to account for 50% of the total output. The company plans to spend ₹3,16,09 crores (₹31.6 billion) over the next three years to boost its production. The oil and gas industry currently confronts three major challenges: huge price fluctuation with volatile commodity prices, capital-intensive processes…

Read More

The Need of Privacy Certifications for Lawyers | The State of Security

The Need of Privacy Certifications for Lawyers | The State of Security

The widespread adaptability and integration of tools and the professionals who can effectively use them to comply with the law will significantly impact the careers of both lawyers and other legal personnel. One of the fastest-growing areas in the legal profession in the United States is Privacy Law. Privacy certifications endorse attorneys as credentialed privacy lawyers. Privacy certifications can boost income streams and growth potential while increasing job stability and sustainability. In addition, privacy certifications…

Read More

CISO Interview Series: The challenges of being University of Oxford CISO

CISO Interview Series: The challenges of being University of Oxford CISO

The job of a CISO is one of constant change and unexpected challenges.  One of the most energetic environments to govern is that of a university. Universities function not only as academic institutions, but also as research hubs, hosting both curious students, as well as notable scholars.  This is an audience not known for slow-motion progress. They need results, and they expect them quickly.  At a large university, the responsibility of a CISO is dizzying….

Read More

Data Distribution Service: An Overview Part 1

Data Distribution Service: An Overview Part 1

In this three-part series, we focus on Data Distribution Service (DDS), which drives systems such as railways, autonomous cars, spacecraft, diagnostic imaging machines, luggage handling, and military tanks, among others. We’ll also explore the current status of DDS and highlight recommendations enterprises can take to minimize the threats associated with this middleware. But first, let’s discuss what DDS is and how it is applied in various industries. Overview DDS is a standardized middleware software based…

Read More

AI/ML Powered Risk Modeling: A Decision-Making Framework

AI/ML Powered Risk Modeling: A Decision-Making Framework

By AJ Sarkar, Founder and CEO of OptimEyes.ai A company’s C-suite and directors assess cyber threats based on the potential impact on high-level business objectives. How will a particular attack impact year-over-year growth? Client experience and trust? Company reputation? An anticipated expansion or product launch? The information security operations team, on the other hand, needs technical details to execute an effective tactical defense, hold the hackers at bay, and minimize damage. In the middle, CISOs…

Read More

Introducing Meraki Webhook Integrations

Introducing Meraki Webhook Integrations

Instead of calling the Meraki API to look for critical network changes, why not have Meraki send alerts using webhooks? Send events, as they happen, to your network monitoring and operations services by having Meraki call them instead. If you are using an existing application, you might struggle sending a webhook directly to it. You will often need to adjust the message format and authentication to match. This is where webhook payload templates come in….

Read More

Why Are Cyber Insurance Premiums Going Up, And How Can You Get a Better Deal?

Why Are Cyber Insurance Premiums Going Up, And How Can You Get a Better Deal?

By Jamie Wilson, MD & Founder, Cryptoloc Technology Group It may not have attracted as much attention as the coronavirus, but ransomware has become a pandemic unto itself – and it’s sending the price of cyber insurance skyrocketing. Here’s what you can do to keep your premiums as low as possible. Cyber insurance is a relatively new addition to the insurance market that helps to protect organisations from the fallout of being hacked and is…

Read More

Crypto Crash Rattles Cybercriminals, Pushing Them Beyond Ransomware

Crypto Crash Rattles Cybercriminals, Pushing Them Beyond Ransomware

What’s happening Crypto prices continue to plunge, but cybercriminals still need the currencies for ransomware attacks. Why it matters Some experts say the price drops might be pushing cybercriminals away from ransomware and toward other kinds of cybercrime that involve stealing traditional money. The collapse of cryptocurrencies is rippling through the world of ransomware, security researchers say, even though bitcoin, ether and other digital tokens remain the payment of choice for cybercriminals locking up corporate…

Read More
1 2,865 2,866 2,867 2,868 2,869 4,071