There’s a need now more than ever for security organizations to implement a structured, detailed, and well-practiced incident response plan. As the Navy SEALs training philosophy goes, “slow is smooth and smooth is fast”—a mantra that can, and arguably should, be adopted by all security teams. In incident...
Criminals tricked into using an FBI-run encrypted messaging app, Verizon's 2021 Breach Investigations Report and overcoming the challenges of recruiting cybersecurity professionals are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.
The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.
SmiNet, Sweden’s infectious diseases database, was temporarily shut down last week by the country’s public health agency, Folkhälsomyndigheten, following several attempted cyber intrusions. The shutdown interrupted the reporting of COVID-19 statistics.
Under pressure to match private sector service experiences and manage costs, public sector agencies are shifting from in-person to digital citizen services. The COVID-19 pandemic has only accelerated digital transformation as locked down government offices, and a remote workforce was charged with adapting to an...
Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
Dr. Victoria Baines, a visiting research fellow at Oxford University in the U.K., is acclaimed as one of the country’s most influential women in cybersecurity. In this video interview, she describes potential future cyberthreats as criminals adapt to the changing cybersecurity landscape.
The surge of cyberattacks on the healthcare sector in the midst of the COVID-19 pandemic has accentuated many critical cybersecurity challenges that must be urgently addressed, says Joshua Corman of the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.
In the past six months alone, we've seen the SolarWinds attack, the Microsoft Exchange Server exploits and the Colonial Pipeline ransomware strike. The threats are more imminent than ever. But Philip Reitinger of the Global Cyber Alliance believes strongly: We created this mess, and we can fix it.
If anyone ever doubted the importance of thinking strategically about cybersecurity, laying the groundwork for expected future requirements, then the coronavirus pandemic will have made that clear, says Kerissa Varma, group CISO of Old Mutual Ltd., who offers lessons learned for being "truly resilient."
As a retired Air Force general and the former federal CISO of the United States, Gregory Touhill is well-versed in critical infrastructure protection and resiliency. Now, as the new director of CMU SEI's CERT division, he has the opportunity to help foster new levels of education and collaboration.
The COVID-19 pandemic has been referred to as a "great equalizer," and in many ways it is - until it isn't. Forrester analyst Allie Mellen, who has studied regional impacts of COVID-19, shares surprising findings from her research.
From identity and access management to cloud migration and connected devices, retired RSA CEO Art Coviello looks beyond the pandemic and says, "It's going to be a Roaring '20s for technology." But he also foresees a potentially calamitous decade for security.
As CISO of Johnson & Johnson, Marene Allison was used to gauging her security posture by the top threat activity: nation-state, cybercrime, insider or hacktivist. But in 2020, they all struck at once. Here is one CISO's take on the state of the industry.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.