In the latest weekly update, ISMG editors discuss why communication is vital to be an effective CISO in 2023, how the hack of Florida-based dental insurer MCNA affects nearly 9 million people, and how CyberArk is securing privileged users with a new browser.
This week: Amazon settled privacy and cybersecurity investigations with the U.S. FTC, SAS received a $3 million extortion demand and apparently Ukrainian hacktivists penetrated Russia's Skolkovo Foundation. Plus, breaches at Onix Group and Toyota and a warning about Salesforce "ghost sites."
Ukrainian cyber defenders warn users for the second time this month to be aware of financially motivated phishing campaigns that load the SmokeLoader malware onto computers. Hackers behind UAC-0006 typically target computers used by accountants and look for banking and credential data.
A community hospital and its clinics in rural Idaho are diverting ambulances and some patients to other facilities as the entities recover from a cyberattack discovered on Monday. The incident spotlights ongoing healthcare sector cyber challenges, especially in rural communities.
Cisco Security Executive Vice President and General Manager Jeetu Patel said the industry struggles to address multifaceted attacks that originate in email and include bad links, malware downloads to a device and more. Cyber defenders need correlated data from multiple sources of telemetry, he said.
In this episode of "Cybersecurity Insights," Chen Burshan and Amir Shachar of Skyhawk Security discuss how they integrated generative AI into their threat detection process and significantly increased the speed and lowered the costs of detecting breaches based by focusing on anomalous activity.
This case study discusses how Standard Chartered nexus needed a unified analytics platform to support security analytics, DevOps, customer experience, and more. While being easy for both technical and non-technical users.
Download this case study to learn the strategies they used, including:
Cloud-native...
This case study discusses how HashiCorp needed a security solution that could keep up with their innovation. They chose a cloud-native solution that provides centralized and scalable Cloud Security Analytics and Cloud SIEM across multi-cloud environments.
Download this case study to learn insights on how to improve...
Through years of rapid growth, SoSafe’s infrastructure for its IT environment and SaaS product had grown significantly and included a mix of cloud and onpremises systems that were all producing high volumes of telemetry data for a range of users and needs.
Download this case study to see how SoSafe was able to...
Security and risk management leaders continue to need a security system of record with comprehensive threat detection, investigation and response capabilities. SIEM is evolving into a security platform with multiple features and deployment models. This research will help you find the right solution.
Download this...
The recent trend of state-sponsored hackers targeting small businesses is just one example of how SMBs (small-medium businesses) and organizations without a dedicated SOC (security operations center) face many of the same security challenges that enterprises face.
So how do smaller companies adapt to their...
A CISO’s unique position is only part of their heavy load. They are the chief security architects in charge of ensuring compliance, securing the supply chain, and covering risk management such as data breaches. In short, they must guarantee a robust security posture while simultaneously maneuvering between business...
The Forrester Wave™ report evaluates 14 security analytics platform providers, analyzing and scoring each provider based on log collectors, SOAR integrations, and availability on cloud service providers. The report emphasizes the importance of security analytics platforms combining features such as analytics,...
Online sports retailer Sports Warehouse has agreed overhaul its security program and pay a $300,000 fine to New York State after hackers stole 20 years' worth of payment card data and customer information the company was storing in plaintext on its e-commerce server.
Check fraud is back although, technically, it never went away. Today, cybercrime groups are openly hawking fraudulent check schemes on the Telegram messaging app. Check fraud is easier and more accessible, and it’s back in the headlines. Experts say banks need to adopt new solutions to curb losses.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.