As we bid farewell to 2023, Philip Reitinger, president and CEO of the Global Cyber Alliance, reflected on the state of global cyber hygiene, shedding light on what's working, what needs improvement, and the transformative shifts necessary to achieve a cyber-secure future.
Joe Kim, president and CEO of Sumo Logic, delved into the company's strategic shifts and future priorities after its acquisition by Francisco Partners this year. The company is now focusing on areas such as cloud-native scalability, technological advancements and a customer-centric approach.
In conjunction with a new report from CyberEd.io, Information Security Media Group asked some of the industry's leading cybersecurity and privacy experts about 10 top trends to watch in 2024. Ransomware, emerging AI technology and nation-state campaigns are among the top threats.
The New York Times is suing OpenAI and its chief backer Microsoft for copyright infringement, alleging that OpenAI used without permission "millions" of its copyrighted articles to train the large language models used by ChatGPT and by extension Bing Chat and Copilot.
Cybersecurity is a critical concern for organizations of all sizes these days, and the responsibility for promoting it often falls on the CISO. But there's often a major disconnect between the CISO and the rest of the C-suite. William Beer of Accenture discussed strategies for bridging the gap.
Quantum computers are in their infancy but rapidly advancing, so firms need to upgrade security protocols now to address threats that quantum technology could one day pose to current cryptographic methods, said Clement Jeanjean, business operations lead in the quantum security group at SandboxAQ.
Javvad Malik, lead security awareness advocate at KnowBe4, delves into the transition from cybersecurity awareness to a robust security culture. He underscored the importance of user-centric security, engaging security training and flexible security measures - in addition to MFA.
Google reached a preliminary settlement in a class action lawsuit that alleged the tech giant had misled consumers about their privacy protections when using the private browsing Incognito mode of its Chrome web browser. The settlement came on the heels of a court ruling clearing the case for trial.
Albania's Parliament and a telecommunications service provider faced online attacks on Christmas day, according to the Albanian National Authority for Electronic Certification and Cyber Security. Iranian hackers called Homeland Justice have claimed responsibility for the latest wave of attacks.
This week, a breach at real estate firm Wealth Network exposed 1.5 billion records, Corewell Health patients were hit by a second breach, data of 1.3M LoanCare mortgage customers was exposed, and Yakult Australia admitted to experiencing a "cybersecurity incident" that exposed 95 gigabytes of data.
This week in the cryptocurrency industry, Thunder Terminal successfully prevented a hack, Changpeng Zhao ranking 34th on a list of billionaires, Coinbase refuted a senator's allegations of subverting crypto regulations, and scammers stole $3 million in 24 hours using fake ads.
Legacy medical gear continues to pose big cyber challenges to healthcare entities. A joint report by the Food and Drug Administration and MITRE Corp. emphasizes the importance of entities taking a consistent risk-based approach to managing these and other devices, said Jessica Wilkerson of the FDA.
Cyberspace aggression against Israel has intensified since the onset of war in the Gaza Strip, changing from online vandalism to attacks aimed at disruption and sowing fear, says Israel's cybersecurity agency. A prominent attack vector is phishing emails.
The National Institute of Standards and Technology is failing to provide adequate information about how it plans to award funding opportunities to research institutions and private organizations through a newly established Artificial Intelligence Safety Institute, according to a group of lawmakers.
The U.S. Department of Defense released a draft of a long-awaited proposed rule for the Cybersecurity Maturity Model Certification program that aims to simplify compliance, enhance public-private coordination and better protect sensitive information from cyberthreats.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.