To pay or not to pay? Negotiating in the age of ransomware

To pay or not to pay? Negotiating in the age of ransomware

In 2023, more than 2,200 networks across United States hospitals, schools and government organizations, as well as thousands of private businesses, were breached by cybercriminals. With another record-breaking year for ransomware and data extortion in the rearview mirror, organizations of all sizes are preparing for when they’ll need to make their big payout in 2024. But what if paying the ransom wasn’t the only way out?  There’s often room to negotiate with threat actors or,…

Read More

Unveiling common ransomware attack methods to secure your organization

Unveiling common ransomware attack methods to secure your organization

With ransomware payments hitting a record $1.1 billion last year, it’s no wonder why it’s top of mind for most business leaders. Instead of wondering whether or not they’ll be hit with a ransomware attack, leaders need to be building a strategy for what to do when an attack is attempted on their business. The question isn’t “Will I get hit with ransomware?” it is “What will I do when it happens?” For years, the…

Read More

Best practices for securing critical and public infrastructure

Best practices for securing critical and public infrastructure

The United States government defines the “critical infrastructure” as 16 specific sectors considered so vital to the U.S. that their incapacitation or destruction would have a debilitating effect on security, national economic security and national public health and/or safety. The “public infrastructure” is a subset of the critical infrastructure and includes roads, bridges, public transportation and airports, drinking water and wastewater treatment systems, solid waste services and facilities, and other important utilities essential to communities…

Read More

Navigate the new European AI Act and possible global standardization

Navigate the new European AI Act and possible global standardization

No doubt, the European Union’s (EU) recently approved, comprehensive regulation act on artificial intelligence (AI) is an important milestone in the global effort to establish responsible AI governance. This landmark legislation establishes a robust legal structure, setting stringent standards for AI development and usage within the EU, with the aim of nurturing a climate where businesses and investors can innovate with confidence, knowing their AI systems must adhere to principles of safety, transparency, equity and…

Read More

5 commitments CISOs can make to boost cyber resilience

5 commitments CISOs can make to boost cyber resilience

CISOs have always had a very tough job, but with spikes in virtually every kind of attack, new AI-related risks and a shifting regulatory environment, keeping businesses safe and compliant is only getting more difficult. While there is no way to anticipate every new threat, there are some data-backed ways to limit risk and build lasting resilience against attacks. Here are five key commitments that CISOs should consider making this year to improve their cybersecurity…

Read More

Getting ahead of the new normal: Counter-drone security

Getting ahead of the new normal: Counter-drone security

Today, commercially available drones are being used as weapons. Flying improvised explosive devices (IEDs) first emerged in the Iraq and Syrian conflicts around 2016. Terrorist organizations released videos of drones used for surveillance and reconnaissance as early as 2014. It did not take long for sophisticated criminals and drug cartels to mirror those tactics of foreign terrorist groups. One cartel has created a drone unit for this specific task. The developments in the Ukraine conflict…

Read More

Cisco CX Empowers Sustainability with Expanded Services

Cisco CX Empowers Sustainability with Expanded Services

In an era where businesses are embracing the vital role of sustainability, Cisco Customer Experience (CX) is here to support you on your sustainability journey. We’re thrilled to share we are expanding our sustainability services and weaving environmental solutions into the fabric of our offers. Through Cisco Lifecycle Services and individual assessments, we’re now providing services that demonstrate how invested we are in helping you succeed in your sustainability goals. A Commitment to Sustainability Our…

Read More

Best practices for effectively securing sensitive data

Best practices for effectively securing sensitive data

Best practices for effectively securing sensitive data | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

CISA publishes resource for migrating to post-quantum cryptography  

CISA publishes resource for migrating to post-quantum cryptography  

CISA publishes resource for migrating to post-quantum cryptography   | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Overcoming challenges in a changing security industry

Overcoming challenges in a changing security industry

Overcoming challenges in a changing security industry | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2 3 5