Oren Eytan spent 25 years in the Israel Defense Forces, rising to the rank of colonel and heading the IDF's cybersecurity unit. Now, as CEO of odix, an Israeli cybersecurity vendor, he is helping his country rebound from the Oct. 7 attacks and support the nation's war against Hamas.
The fallout from the SEC's charges of fraud and internal control failures against SolarWinds and its CISO has implications for the industry. Cordery Compliance attorney Jonathan Armstrong advises security leaders to "take heed and remember that the actions of today can determine your fate tomorrow."
When asked what has changed most since Oct. 7, Chen Shmilo, CEO of Israel's 8200 Alumni Association, said "trust." Trust in leadership has changed, but trust in society and its power to be resilient has been renewed, he said. "In these darkest times, some things might even change for the better."
In the latest weekly update, ISMG editors discuss how cybersecurity businesses are building resilience during the Israel-Hamas war, the latest on the hacks of Cisco IOS XE devices, and recommendations for businesses in Indonesia looking to improve their cybersecurity practices.
"We're doing fine, but we're not OK." This was the opening comment from Michael Yehoshua, CMO of HolistiCyber, discussing the impact of the Israel-Hamas war. Yehoshua shared his insights about the conflict, its historic perspective and how his and other Israeli companies are focused on resilience.
Welcome to "Cyber Fail." In this ISMG program, our experts uncover fails so we can strengthen our defenses. In this episode, we take on deepfakes, hallucinating chatbots, the fate of humanity and why you should never put your trust in a ransomware gang.
In the latest "Proof of Concept," DXC Technology IT CISO and CyberEdBoard member Mike Baker and Chris Hughes, co-founder and CISO of Aquia, join ISMG editors to discuss benefits, challenges and misconceptions of adopting open-source software in modern code bases - plus best practices for securing them.
In the latest weekly update, editors at Information Security Media Group discuss the impact of the Israel-Hamas war on the threat landscape and the workforce, the role of the U.S. in shaping the future of AI technology, and highlights from ISMG's Financial Services Summit in New York.
Since deception technology provides early warning of potential attacks by tricking hackers into accessing fake information, can AI tools such as ChatGPT be used to create more convincing lures? That's a question Xavier Bellekens, CEO of Lupovis, put to the test - with promising results.
Arctic Wolf last week announced plans to buy SOAR platform provider Revelstoke in a move to boost Arctic Wolf's automated response capabilities and lay the groundwork for "deeply embedded" AI and machine learning. CEO Nick Schneider explained how the deal will benefit customers and drive innovation.
Each year, financial scams cost banks up to $400 million in losses. Despite heavy investments in anti-fraud technology, banks are struggling to protect customers. Bank impersonation scams continue to be the most widely used approach for duping banking customers, said CEO of a stealth startup and the former senior...
Businesses and governments have been using artificial intelligence and machine learning for years, but little has been done to understand its biases. Aditya Vasekar, senior principal for product security with Microsoft, discussed AI bias challenges and how organizations can address them.
As organizations grapple with an increasingly complex digital landscape, CISOs and CIOs are faced with heightened executive liability. With the high-profile cases of CIO Carlos Abarca and CSO Joe Sullivan serving as stark examples, the message is clear - executives cannot afford to be complacent.
The use of artificial intelligence can profoundly improve operations and services across many industries, but the multifaceted relationship between AI and cybersecurity calls for new measures to address security, privacy and regulatory concerns through the right protocols and procedures.
It could be weeks or months before outsiders have a clear picture of the cyber dimension of the conflict between Hamas and Israel, a cyber expert said. "As some of these stories come out, as we will start to learn about what was actually targeted," said Rob T. Lee of the SANS Institute.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.