The latest edition of the ISMG Security Report features an analysis of British spy chief Jeremy Fleming’s "cybersecurity call to arms." Also featured: Insights on COVID-19 business continuity planning; the wisdom of the late Dan Kaminsky.
A lawsuit alleges that a security flaw in a Google COVID-19 contact-tracing tool is exposing personal and medical information of millions of users to third parties through device system logs. But Google says it reviewed the issue, updated code and is ensuring the fix is rolled out to users.
The federal ban on funding for a national unique patient identifier adds to the complexity of customer identity and access management, especially when dealing with new patients during the COVID-19 pandemic, says Aaron Miri, CIO at UT Health Austin.
COVID-19 infections and death rates are down in the United States, and the percentage of vaccinated citizens is rising. Does this mean the end of the pandemic is finally in sight? Not quite, says continuity planning expert Regina Phelps, who explains why.
No script, no filter: Just Microsoft’s Edna Conway and Cisco’s Wendy Nather gathering with privacy leader Michelle Dennedy to discuss the impact of the SolarWinds supply chain attack and to play Buzzword Mystery Date with SASE, CIAM and "passwordless" authentication - are these trends dreamboats or duds?
Cybercriminals, likely backed by nation-states, are expanding global spear-phishing campaigns targeting the COVID-19 vaccine "cold chain" in an attempt to steal credentials so they can gain "privileged insight" into sensitive information, the IBM Security X-Force says in an updated report.
Due to the impact of COVID-19, 2020 will be widely regarded as the year that work moved home. In reality, it was the year work moved to the cloud and everywhere in between. As a result, endpoint management and endpoint security are now the cornerstones of effective protection and the foundation for the next generation...
How much does it cost to recover from a ransomware attack? For the Scottish Environment Protection Agency, which was hit by the Conti ransomware-wielding gang on Christmas Eve, reported cleanup costs have reached $1.1 million. SEPA is still restoring systems and has refused to pay any ransom.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued multiple alerts over concerns that the rush to use Microsoft 365 and other cloud productivity platforms as a result of the COVID-19 pandemic may expose organizations to undue risk.
Download this checklist and evaluate your organization’s...
Forrester Research Inc. first coined the term “zero-trust” in 2010. A decade and a pandemic later, with businesses implementing hybrid multi-Cloud environments, identity and access management can no longer be considered optional. Extending VPN protection is not enough.
Risk-based authentication enhances both...
The rush to operationalize remote work did not afford the time to conduct the usual level of due diligence associated with a range of issues such as scaling VPN infrastructure, tightening access/authentication policies and process and vetting personal devices not configured to corporate standards.
Organizations are embracing the work from home reality by accelerating their digital transformation initiatives and shift to the cloud. To empower their remote workforce and improve business efficiencies, software-as-a-service (SaaS) solutions are helping organizations deliver rapid time to value and enhance user...
Unemployment fraud incidents have spiked in the past year, and high-salaried senior executives are often the fraudsters’ victims. Dr. Christopher Pierson of BlackCloak describes how these scams are pulled off, what impact they have and how the CISO can bolster defenses.