Details about the SolarWinds hack continue to emerge months after the supply chain mega-breach was first discovered late last year. The latest revelations come from Microsoft, which is calling the cyber-attack the most sophisticated of all time. “I think from a software engineering perspective, it’s probably fair to say that
Category: Cyber Security
Cybersecurity is the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
Top Governance Risks For Board Directors And CEOs: Cybersecurity And Artificial Intelligence
Ask most board directors and CEO’s to define cybersecurity and artificial intelligence in a board meeting and have them share their answers and you may well find that their depth of knowledge is too shallow in their duty of care responsibilities. This, however, is fast changing after many years where
The Consequences Of A Future Hack? How AI Is Transforming Cybersecurity
Microsoft recently acknowledged Russian hackers successfully cyberattacked them. If hackers can penetrate their internal systems, what are the chances your company will suffer the consequences of a future hack? What the Russians have done is very bad, but it’s only an example of the cyber threats we all face. The
Revolutionize Utilities’ Security With Help Of AI And Video Analytics
According to Gartner’s latest CIO survey, 94% of Energy, Oil & Gas Utilities’ IT leaders prioritize location and cybersecurity, 38% are investing in Artificial Intelligence and machine learning and 17% in the Internet of Things including sensor-based video technologies. Energy, Oil & Gas Utilities are facing increasing pressure to reduce
Vishing Attack At The Ritz: A New Type Of Social Engineering Scam
There’s another clever fraud tactic to add to your library of security threats. Imagine a call or voice message that appears to come from a trusted source but is really a disguised attempt to compromise your identity, credentials or financial information. More of a social engineering scheme than a vulnerability,
Zero-Trust Cybersecurity: Trust No One? | A Panel Discussion
Protecting digital assets is becoming harder and harder, for one alarming reason: most organizations have poorly prepared for the deluge of cloud-based applications and end-point devices. This transformation has created vulnerabilities well beyond any corporate-controlled environment, expanding the potential for data breaches into completely unchartered territory. As the enterprise perimeter
Does Your Company Management Understand Cyber Risks?
Over the past decade, business leaders have had to face an uncomfortable truth: It’s become impossible to sit at the head of a company and not address the threat of cyber risk. Cyber-attacks are increasingly pervasive and can present near existential threats to companies, and boards of directors and CEOs
Ransomware Crooks Start Selling Victims’ Data To The Highest Bidder
Being struck by ransomware used to mean that data would be lost forever unless you paid up. Those days are long gone. Today ransomware gangs are also stealing their victims’ data… and in some cases auctioning it off on Dark Web markets. The hackers behind the REvil or Sodinokibi ransomware have siphoned off terabytes of data from the systems they’ve infected. When victims aren’t willing to meet ransom demands, the REvil gang is more than willing to use alternative means to profit from their attacks.
Securing Your Work From Home
Even though millions of workers have been directed by their companies to work from home, it still shocks me that many of them are again not taking the proper precautions to protect their data. Some of this stems from the fact that many companies, at the onset of COVID-19, did not have substantial work from home security guidelines and requirements for users who were using their personal PCs or mobile devices to work from home. Some consumers still believe, falsely, that a severe data breach can’t happen to them.
Adopting A Zero Trust Security Approach: Keep This Five Things In Mind
The COVID-19 pandemic has brought about a seismic shift in how the world goes to work. Apart from essential services, remote work is the new normal, mandated everywhere – even in organizations that never previously offered remote work options. Lack of VPN infrastructure or its ability to scale, legacy systems that were never designed for remote work, previous reluctance to implement work from home, poor cybersecurity hygiene – all of these pose challenges for organizations trying to adjust to this new normal.