It's not enough for medical device makers to provide a software bill of materials - there also needs to be close attention paid to how vulnerabilities in components are communicated and managed, says medical device security expert Ken Hoyme.
Twilio, which runs a customer engagement platform used by thousands of businesses, says that its employees were tricked via SMS phishing messages into giving attackers their login credentials, resulting in the theft of information on customers, as well as their customers and end users.
According to 451 Research’s Voice of the Enterprise, 'loss of control of sensitive data’ is reported as a top three potential issue with cloud solutions by 25.9% of survey respondents – outranking even the common concern for cloud provider lock-in.
The overall enterprise motion toward cloud adoption has been...
With data taking the spotlight, there are important implications for security, privacy, and compliance teams. It’s not just your company that sees value in your data. There are many bad actors that also see value in your sensitive data too.
Your data and databases are the primary target for attackers. And with...
Referred to as the Data Mesh, this growing ecosystem of databases, data lakes and data services enable businesses to embrace data democratization and be data driven. It eliminates silos, unlocks innovation, and helps improve customer experience and company culture.
To truly harness these benefits, IT, DevOps, and...
Federal authorities, in two separate advisories issued Thursday, urge healthcare sector entities to proactively address security risks from internet of things devices equipped with sensors, software and other technologies to connect and exchange data over the internet and from open web applications.
The era of pandemic-induced telework is also the era of higher reliance on mobile devices for sensitive workplace information - meaning we're likewise living in the age of fretful chief information security officers, a new survey concludes. "Companies are still struggling" to secure mobile devices.
This year's winner of RSA Conference's prestigious Innovation Sandbox Contest has completed its first major funding round, earning backing from CrowdStrike CEO George Kurtz. Talon has received $100 million to support more operating systems, add more capabilities and boost existing integrations.
Some experts predict cyber insurance rates will increase 40-75% in the near future, and MSPs need to take action now to protect their profits and businesses in 2022 and beyond. The panelists will explore why ransomware attacks are at the heart of these increases. This webinar features expert insights from:
Richard...
The move to cloud email has allowed companies to streamline security investments and leverage the native Microsoft functionality provided by Exchange Online Protection (EOP) and Defender for Office 365 (MDO). But this approach isn’t perfect, and many companies have realized that they need an additional layer of...
As organizations have moved their email servers from on-premise systems like Microsoft Exchange to cloud services like Microsoft 365, there are more ways to secure email than ever before. From native security to a secure email gateway to integrated cloud email security solutions, the options are nearly limitless....
Fortinet has raised prices on products and services to address macroeconomic challenges including shipping delays, longer activation timelines and the suspension of sales in Russia. The company says price hikes have more than offset supply chain and geopolitical headwinds in recent months.
John Kindervag, creator of zero trust and senior vice president at ON2IT, and Grant Schneider, senior director at Venable, join ISMG editors to discuss the latest Log 4j findings, threats posed by a Chinese-made automotive GPS tracker and the challenges of a distributed workforce.
Remote workers depend on anywhere access to your business apps and resources, but a VPN cannot protect you from social attacks and other new threats. You need a Zero Trust Network Access (ZTNA) solution that can both protect your distributed workforce and ensure a quality user experience.
Download this report with...
Most cybersecurity leaders know that people are their organizations’ biggest and most dynamic attack surface. So why is phishing still the threat type most likely to cause a data breach? Most training programs lack staying power and doesn’t promote lasting changes in behavior. Download this e-book to learn why...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.