Anneka Gupta, chief product officer at Rubrik, discusses embedding zero trust principles into how the security company provides data resilience, data observability and data recovery for organizations. She also describes the "software-first" approach of building immutability directly into software.
The latest edition of the ISMG Security Report discusses how financial service organizations should respond to the new "fraud universe." It also shares how CISOs can incorporate social media into their threat intelligence programs and describes the skills required by today's security leaders.
McDonald’s Corporation is the world’s largest restaurant chain. Just like every organization, McDonald’s is concerned that threat actors are targeting their employees across the world. It only takes one person to click on a malicious link and create a data breach. Thus, one of their key initiatives is empowering...
Employees are leaving at an unprecedented rate. As a result, the Great Resignation has created more opportunities for data loss than ever before. According to the 2022 Voice of the CISO report, CISOs agree that protecting data has become an increased challenge. So, how do you protect your organization against data...
The U.S. Department of Defense continues to experiment with bug bounties to draw in vulnerability reports from outside white hat hackers. It kicked off a new test program for continuous rewards on America's Independence Day by setting aside a pool of $110,000.
IBM has purchased a data observability startup to help organizations address data errors, pipeline failures and poor quality before it affects their bottom line. Databand.ai will help businesses ensure that trustworthy data is being put into the hands of the right users at the right time.
Federal authorities are alerting healthcare and public health sector entities of threats involving North Korean state-sponsored "Maui" ransomware. Attackers use the malware to maliciously encrypt diagnostics procedures, medical imaging, and medical center intranet services.
Expectations for CISOs and their teams are at an all-time high, says Deborah Haworth, CISO of Penguin Random House UK. "Over the past two years, we've had a number of organizations pivot the way they work, which brings increased security challenges" and increases pressure on employees, she says.
Swimlane has raised $70 million to expand its clientele beyond the Fortune 2000 and acquire more customers in Europe and Asia-Pacific. The company plans to hire more personnel focused on sales, marketing and partnerships to make the company's low-code security automation platform accessible.
Hotel chain Marriott International Inc. confirmed reports of a data breach and attempted extortion incident. Unknown hackers claim to have stolen 20 gigabytes worth of data but the hospitality giant tells ISMG only one system was compromised and no critical business or customer data was exposed.
The National Institute of Standards and Technology today announced a first group of encryption algorithms designed to withstand the assault of a future quantum computer. Selection of the four algorithms comes after six years of evaluation by the U.S. federal agency.
The Django web framework patched a high-severity vulnerability affecting its main branch and three other versions - 3.2, 4.0 and 4.1. Developers who match inputs against safelists are unaffected. There are more than 91,000 websites using the Django framework, many of them based in the United States.
A misconfigured Alibaba private cloud server has led to the leak of around 1 billion Chinese nationals' personal details. An unknown hacker, identified as "ChinaDan," posted an advertisement on a hacker forum selling 23 terabytes of data for 10 bitcoins, equivalent to about $200,000.
As this technology is automated, it can also scan more accesses because a new rule doesn’t need to be created for each access. You can jump from a 1% audit rate to a 99% audit rate.
Watch this short video where threat researchers do a review of the threat landscape. They will share the highlights of the latest popular tactics that are trending with cyber criminals in today’s world.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.