Network Resilience: Accelerating Efforts to Protect Critical Infrastructure

Network Resilience: Accelerating Efforts to Protect Critical Infrastructure

As head of the Cisco Trust Office, Matt Fussa leads a global team that partners with government agencies, regulators, and customers to help shape cybersecurity regulation and manage cyber risk. He is one of Cisco’s representatives in the Network Resilience Coalition, an industry alliance focused on seeking solutions to cybersecurity threats to our global economic and national security, particularly attacks that exploit gaps in software maintenance in critical infrastructure. I recently participated in the Network…

Read More

Organizations increasingly look to observability to solve critical challenges

Organizations increasingly look to observability to solve critical challenges

Enterprise observability practices: Opportunities, challenges, and the growing role of AIOps Observability is now firmly established in organizations with 78% of enterprises and large midmarket companies having an observability practice in place, according to recent research by Enterprise Strategy Group (ESG). The research findings, described in Distributed Cloud Series — Observability and Demystifying AIOps, gauge the state of observability in the enterprise. The good news is that organizations are realizing many of the benefits of…

Read More

The 20 Coolest Web, Email and Application Security Companies Of 2024: The Security 100

The 20 Coolest Web, Email and Application Security Companies Of 2024: The Security 100

From vendors offering code security tools to those protecting inboxes and websites against attacks, here’s a look at 20 key companies in web, email and application security. Among the major disclosures in a recent AI security report from Microsoft and OpenAI was this doozy: It’s likely that nation-state hackers are, indeed, using GenAI to create phishing emails. While the potential for GenAI-powered phishing and social engineering has been widely discussed since the debut of OpenAI’s…

Read More

Should IT and Security Teams Play a Role in Crisis Communications?

Should IT and Security Teams Play a Role in Crisis Communications?

Outages and cyber incidents can have a direct impact on a company’s brand, share price and jobs, according to Louise Roberts, managing director at Sphere Public Relations in Australia. She also noted they can cost an “extraordinary” amount of money in lost revenue and fines. Louise Roberts. Source: Sphere PR For this reason, IT leaders, including CIOs and CISOs, should be heavily involved in crisis communications planning and incident response. Roberts said the involvement of…

Read More

Google Threat Analysis Group's Spyware Research: How CSVs Target Devices and Applications

Google Threat Analysis Group's Spyware Research: How CSVs Target Devices and Applications

A new publication from Google’s Threat Analysis Group focuses on commercial surveillance vendors, whose services are bought by governments for monitoring or spying purposes. Google is currently tracking more than 40 CSVs, most of which are highly technical with the ability to develop spyware and zero-day exploits to compromise their targets, particularly on Android and iOS devices. Read details about what CSVs target, how spyware is used, CSVs’ harmful impact on individuals and society and…

Read More

IBM, ISC2 Offer Free Cybersecurity Certificate

IBM, ISC2 Offer Free Cybersecurity Certificate

Image: ISC2 The International Information System Security Certification Consortium and IBM teamed up on February 12 to launch the IBM and ISC2 Cybersecurity Specialist Professional Certificate, which can be earned through a free, four-month, beginner-level training course. IBM chose ISC2 to develop the certification program, which prepares potential cybersecurity professionals for a career in a cybersecurity specialist role. The IBM and ISC2 Certificate provides cybersecurity training and proof of skills The IBM and ISC2 Cybersecurity…

Read More

Google Cloud's Nick Godfrey Talks Security, Budget and AI for CISOs

Google Cloud's Nick Godfrey Talks Security, Budget and AI for CISOs

Image: Adobe/Sundry Photography As senior director and global head of the office of the chief information security officer (CISO) at Google Cloud, Nick Godfrey oversees educating employees on cybersecurity as well as handling threat detection and mitigation. We conducted an interview with Godfrey via video call about how CISOs and other tech-focused business leaders can allocate their finite resources, getting buy-in on security from other stakeholders, and the new challenges and opportunities introduced by generative…

Read More

Botnet Struck U.S. Routers; Here’s How to Keep Employees Safe

Botnet Struck U.S. Routers; Here’s How to Keep Employees Safe

State-sponsored hackers affiliated with China have targeted small office/home office routers in the U.S. in a wide-ranging botnet attack, Federal Bureau of Investigation Director Christopher Wray announced on Wednesday, Jan. 31. Most of the affected routers were manufactured by Cisco and NetGear and had reached end-of-life status. Department of Justice investigators said on Jan. 31, 2024, that the malware has been deleted from affected routers. The investigators also cut the routers off from other devices…

Read More

Ransomware's Impact May Include Heart Attacks, Strokes & PTSD

Ransomware's Impact May Include Heart Attacks, Strokes & PTSD

Ransomware incidents cause significant harm at many levels, including to physical and mental health; new research from U.K. security think tank Royal United Services Institute has classified this impact into three categories (Figure A): First-order harms: The harms to organizations and their staff. Examples include data loss, reputational harm and heart attacks. Second-order harms: The indirect harms to organizations and individuals. Examples include clients and customers in supply chains might be targeted, and patients’ cancer…

Read More

More Australian IT Leaders Could Be Looking to Replace Passwords With Passkeys in 2024

More Australian IT Leaders Could Be Looking to Replace Passwords With Passkeys in 2024

The Australian government announced in 2023 that it would phase out the use of passwords to access key government digital service platform myGov. In the first half of 2024, Australians may be asked to adopt passkeys, which use individual biometric data to authenticate users. The myGov passkey push across the Australian population will pave the way for IT leaders to adopt this more secure form of authentication in the private sector as public awareness and…

Read More
1 11 12 13 14 15 22