Google Cloud, a leading survey sponsor, contributed expert insight analysis on the result findings in the following interview with Anton Chuvakin, Security Adviser at Office of the CISO.
Industrious attackers are using cutting-edge deepfake and AI technologies to blend impersonation and social engineering attacks. Robust processes that include checks and balances and improved proving awareness of staff and customers are the keys to preventing them.
The European Commission will scrutinize Meta's pivot to a subscription model in response to a string of rulings from data protection boards limiting the social media giant's ability to legally collect user data. Europe announced a slew of investigations into American big-tech companies.
The move to cloud has uncovered a range of risks that enterprises might inadvertently overlook. Transition often highlights cloud concentration risk, which encompasses vendor, availability, business continuity and regulatory risks, said Abid Adam, group chief risk and compliance officer at Axiata.
As thousands of hospitals, clinics and doctor practices potentially have to notify millions of patients about the Change Healthcare breach, the American Hospital Association said the IT services firm and parent company, UnitedHealth Group, should be the sole sender of notifications.
After suffering a data breach, organizations that work closely with regulators and cybersecurity officials will be treated with greater leniency if their case results in penalties and a fine, says new guidance on data protection fines published by the U.K. Information Commissioner's Office.
The Foundation for Defense of Democracies on Monday released a white paper that urges Congress to establish a seventh military branch to serve as an independent armed cyber service amid growing threats in cyberspace from foreign adversaries such as Russia and China.
Chinese state hackers targeted multiple British politicians, the U.K. government said Monday in a coordinated disclosure of Chinese state hacking activities designed to ramp up international pressure on Beijing. The British government summoned the Chinese ambassador to the Foreign Office.
U.S. federal prosecutors indicted seven Chinese nationals they accuse of hacking for a Beijing economic and intelligence espionage group whose operations reacted to geopolitical trends. The suspects allegedly were contractors for a front company set up by an arm of the Ministry of State Security.
Despite advances in endpoint security, Sergei Rousakov, chief security architect at LinkedIn, said the landscape remains complex. He said endpoint tools need to take a more integrated approach that includes identity and device context to truly protect against cybersecurity threats.
As enterprises migrate their workloads, applications and data to the cloud, why should business security practitioners consider software firewalls for protecting their cloud environments? Raj Patil of Palo Alto Networks shares his top customer use cases.
If we proactively tackle the complexities of the AI revolution, we can ensure that it serves as a catalyst for innovation rather than a source of displacement. With thoughtful planning and inclusive policies, the integration of AI into the professional world can enhance human potential.
Iran-aligned threat actor TA450, also called MuddyWater, is using fake salary, compensation and financial incentive emails to trick Israeli employees at multinational organizations into clicking malicious links, according to researchers at security firm Proofpoint.
The integration of Oxeye into GitLab’s suite marks a significant leap in the accuracy and efficiency of security scans, directly addressing the challenge of false positives in static application security testing and enhancing software security across development stages, according to GitLab.
A Russian hacking group is targeting German political parties as part of a Moscow-backed espionage campaign. The latest APT29 campaign marks the first time the group has been seen targeting political organizations, according to researchers at Mandiant.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.