The guilty verdict against Joe Sullivan, former chief security officer of Uber, has generated much discussion about CISO accountability for disclosures of breaches. How should CISOs be preparing to deal with this responsibility? Kirsten Davies, CISO at Unilever, said communication is crucial.
Top things to consider before you deploy automation
Breaking down a process into an automated workflow
Some "low-hanging fruit" use cases for immediate time savings
Insights from Cortex XSOAR customer telemetry to see how your peers are deploying automation
The convergence of SIEM and SOAR technologies simplifies and modernizes investigations by integrating detections, response templates, and automation. In this webinar, you will see how Splunk Mission Control strengthens your digital resilience by bringing order to your security operations' chaos.
Healthcare sector entities' reliance on specialty and legacy equipment, including imaging systems and other gear, continues to present attractive targets for threat actors and a growing risk for medical providers, said Frank Catucci, CTO and head of research at security firm Invicti Security.
CEO Michael Mumcuoglu says detection posture management can be used in concert with the MITRE ATT&CK Framework to detect and remediate threats. DPM offers a proactive, systematic approach to detection and response and uses automation and analytics, which he said help deliver improved effectiveness.
Arguably, the hottest topic of RSA Conference 2023 was the impact of AI and machine learning. OpenText Cybersecurity Senior Vice President of Marketing and Strategy Geoff Bibby said organizations need to develop AI policies, but they really need to focus on simplifying their security environment.
Virtual desktop infrastructure has been around for years as an option to secure hardware and systems, but VDI often causes friction for the business and can be unpopular with users. Island is taking on those challenges with its Enterprise Browser by managing everything in the browser.
RTM Locker ransomware-as-a-service operators have now turned their attention to Linux, network-attached storage devices and ESXi hosts. The highly structured group appears to be using a new ransomware strain that shows traces of Babuk ransomware's leaked source code.
Prosecutors are urging a U.S. federal judge to sentence former Uber CSO Joe Sullivan to 15 months in prison for his role in impeding an investigation into the ride-hailing company's security practices. Sullivan exploited "his position to cover up a deeply embarrassing event," prosecutors wrote.
Supply chain attacks once were the exclusive provenance of nation-state hackers, says Eric Foster, strategic advisor to Stairwell. But not anymore. "More and more of those are moving downmarket," he said. "These days every threat would qualify as an advanced and persistent threat."
Identity is now the first line of attack, so how can enterprises minimize their attack surface? Identity threat detection and response is a newly recognized cybersecurity solutions category. Sean Deuby of Semperis discusses ITDR and how enterprises can best take advantage of it.
One Brooklyn Health is facing a proposed class action lawsuit in the wake of a data breach affecting more than 235,000 individuals, which the organization reported to regulators following a cyberattack late last year that disrupted its IT systems and patient services for several weeks.
Offense is what paces innovation in cybersecurity since threat actors constantly look for new ways to compromise systems, said AllegisCyber Capital's Bob Ackerman. Many offensive cyber capabilities developed by the national intelligence community make their way into the wild and become exploitable.
Many infrastructures have both OT and IT systems, making data and device transfer between the two systems difficult. Also, some OT devices are outdated while IT systems use modern cloud devices. And the shortage of training is another important hurdle, said OPSWAT CEO Benny Czarny.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.