In “Secrets and Lies” (2000), I wrote: It is poor civic hygiene to install technologies that could someday facilitate a police state. It’s something a bunch of us were saying…
After more than 25 years of mitigating risks, ensuring compliance, and building robust security programs for Fortune 500 companies, I’ve learned that looking busy isn’t the same as being secure.
It’s an easy trap for busy cybersecurity leaders to fall into. We rely on metrics that tell a story of the tremendous efforts we’re expending - how many vulnerabilities we patched, how fast we
HellCat - the ransomware gang that has been known to demand payment... in baguettes! Are they rolling in the dough? Bread it and weep in my article on the Tripwire…
The US military and law enforcement learned to outthink insurgents. It's time for cybersecurity to learn to outsmart and outmaneuver threat actors with the same framework. Read More
The company reports that no sensitive information was breached or stolen in the cyber intrusion and that its operations are running normally again. Read More
Researchers have detected active exploitation attempts targeting two critical vulnerabilities in Cisco’s Smart Licensing Utility that were patched approximately six months ago. Threat actors leverage these flaws, which could potentially…
The Salt Typhoon attacks underscored the need for unity, innovation, and resilience in the face of an increasingly sophisticated cyber-threat landscape. Read More
To truly become indispensable in the boardroom, CISOs need to meet the dual demands of defending against sophisticated adversaries while leading resilience strategies. Read More
This week in cybersecurity from the editors at Cybercrime Magazine –Read the full story in Betashares Sausalito, Calif. – Mar. 10, 2025 With so many interconnected devices in business and…
This week in cybersecurity from the editors at Cybercrime Magazine –Read the full story in Security InfoWatch Sausalito, Calif. – Mar. 5, 2025 “If Global Cybercrime Inc. traded on a stock exchange,…
[[{"value":"Indian stock broker Angel One says client information was compromised in a data breach involving its AWS account. The post Indian Stock Broker Angel One Discloses Data Breach appeared first…
Have you ever wondered why businesses still face cyber threats, even with the latest security software? Cybercriminals are always finding new ways to attack. To stay safe, companies need strong…
Expert Insights on the Role of AI and Automation in Enhancing Cybersecurity Resiliency – Vlad Babiuk, Director of Competitive Technical Product Marketing San Jose, Calif. – Feb. 28, 2025 Resiliency…
Australia has become the latest country to ban the installation of security software from Russian company Kaspersky, citing national security concerns.
"After considering threat and risk analysis, I have determined that the use of Kaspersky Lab, Inc. products and web services by Australian Government entities poses an unacceptable security risk to Australian Government, networks and data,
An Advanced Persistent Threat (APT) is a sophisticated and stealthy cyberattack designed to gain unauthorized, long-term access to a target’s network. These attacks are meticulously planned and executed by highly…