As Russia's invasion of Ukraine continues, what should global CISOs and security teams do to ensure that their organizations stay protected? Beyond following cybersecurity agencies' guidance, experts offer advice on how to brief the board of directors, appeal for resources, support teams and more.
This ISMG Security Report analyzes why Russia has not yet launched full-scale cyberattacks in Ukraine and the West and what we might expect to come. It also describes how organizations can bolster cyber defenses in times of crisis and outlines mistakes organizations make following a cyber incident.
Amid escalating violence in Ukraine and sanctions meant to hobble Moscow, the Senate has passed a landmark cybersecurity package that bundles three substantial measures - mandatory incident reporting for critical infrastructure, an update to federal IT security strategy, and FedRAMP authorization.
Ukrainian online newspaper Pravda has published what it says are details on 120,000 Russian soldiers, citing Ukraine's Center for Defense Strategies as the source. But chatter seen by Information Security Media Group on Telegram suggests that the source of the dataset is the hacker group ENIGMA.
Why didn't Russia unleash major cyberattacks against Ukrainian critical infrastructure ahead of its invasion troop advance? While theories abound, some experts warn that, unfortunately, this war and its cost to human life is only set to get worse.
In the face of the Great Resignation, Jennifer Mitchell, vice president of operations and optimization at ActZero, predicted in late 2021 that the opposite was true for cybersecurity personnel - a phenomenon she calls the "Great Retention." Mitchell discusses the importance of work-life experience.
Monongalia Health System, a West Virginia-based entity that reported a phishing breach in December, affecting nearly 399,000 individuals, this week reported a separate security incident that appears to have potentially involved ransomware. Are the incidents related?
Federal authorities are warning healthcare and public health sector entities to be proactive and vigilant to at least three main potential threat groups, as well as various wiper malware, linked with Russia's attack on Ukraine.
The federal agency enforcing HIPAA is urging covered entities and business associates to sharpen their focus on protecting their organizations against cyberattacks. The agency has also laid out a list of priorities for rule-making, enforcement and other activities in 2022.
Amid what is now a prolonged struggle in Ukraine, cybersecurity officials in the U.S. and European Union have expressed some surprise over Russia's lack of pervasive cyber strikes to date. But they warn that these actions could follow as its economy reels from sanctions.
The Lapsus$ ransomware group says it has released some of the data trove stolen from chipmaker Nvidia. Leaked data contains proprietary source code, drivers and documentation on Nvidia's Falcon and LHR products. Experts discuss the impact on Nvidia, the stolen data's worth and remediation measures.
As Russia continues its invasion of Ukraine, Western governments and certain hacktivists remain steadfast in opposition. On social media, international hacktivist collective Anonymous says it has successfully hacked websites of the Russian government, media and banks.
Belarus has renounced its nonnuclear status and is set to support moving the Kremlin's nuclear weapons into the country - within striking distance of Ukrainian capital Kyiv. This has sparked backlash from cyber hacktivist groups, who have now targeted and disrupted Belarus' critical services.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.