Ukraine Cyberattack 2022: Geopolitical Cybersecurity

Ukraine Cyberattack 2022: Geopolitical Cybersecurity

Europe is on a knife-edge. With over 130,000 Russian troops amassed on the Ukrainian border, the region is witnessing the biggest build-up of firepower since the cold war. Inevitably, there is also cyber-dimension to this conflict. Mounting attacks on Ukrainian websites and I.T. infrastructure are making policymakers in Washington and elsewhere nervous should tensions rise further. All of this comes amidst unprecedented US-Russian cooperation to crack down on organized cybercrime. However, CISOs should be clear:…

Read More

Global Cyberattacks: Managing Risk in Chaotic Times

Global Cyberattacks: Managing Risk in Chaotic Times

Global Cyberattacks: Managing Risk in Chaotic Times Risk Management As global tension rises, cyber-risk management and security fundamentals are the key to cyber-resilience By: Trend Micro February 24, 2022 Read time:  ( words) While it seems almost cliché now, we are living in unprecedented times. The global pandemic has forced organizations everywhere to deal not only with health and supply-chain challenges, but also with increasing political turmoil that can negatively impact ongoing operations. And with…

Read More

Ukrainian government and banks affected by cyberattacks

Ukrainian government and banks affected by cyberattacks

Ukrainian government and banks affected by cyberattacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Women in Cyber Security Conference takes place March 17-19

Women in Cyber Security Conference takes place March 17-19

Women in Cyber Security Conference to take place March 17-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Meyer suffers cyberattack by Conti ransomware gang

Meyer suffers cyberattack by Conti ransomware gang

Meyer suffers cyberattack by Conti ransomware gang | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Why scalper bots will be your worst security nightmare in 2022

Why scalper bots will be your worst security nightmare in 2022

Why scalper bots will be your worst security nightmare in 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Listen to George Gerchow, CSO at Sumo Logic, discuss how to build a seamless cybersecurity strategy

Listen to George Gerchow, CSO at Sumo Logic, discuss how to build a seamless cybersecurity strategy

Listen to George Gerchow, CSO at Sumo Logic, discuss how to build a seamless cybersecurity strategy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Listen to George Gerchow, CSO at Sumo Logic, discuss how to build a seamless cybersecurity strategy

Listen to George Gerchow, CSO at Sumo Logic, discuss how to build a seamless cybersecurity strategy

Listen to George Gerchow, CSO at Sumo Logic, discuss how to build a seamless cybersecurity strategy | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Betsy Soehren-Jones joins Fortress Information Security as COO

Betsy Soehren-Jones joins Fortress Information Security as COO

Betsy Soehren-Jones joins Fortress Information Security as COO | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Brands are trying on data clean rooms, but they’re not one size fits all

Brands are trying on data clean rooms, but they’re not one size fits all

Brands are trying on data clean rooms, but they’re not one size fits all | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More
1 86 87 88 89 90 167