Building cyber resilience in banking: Expert insights on strategy, risk, and regulation

In this Help Net Security interview, Matthew Darlage, CISO at Citizens, discusses key strategies for strengthening cyber resilience in banks. He underlines that adherence to frameworks like NIST is essential for continuous improvement and that data pro… Continue reading Building cyber resilience in banking: Expert insights on strategy, risk, and regulation

CISO vs. CIO: Where security and IT leadership clash (and how to fix it)

The dynamic between CISOs and CIOs has always been complex. While both roles are essential to an organization’s success, their priorities often put them at odds. The CIO focuses on IT efficiency, innovation, and business enablement, while the CISO prio… Continue reading CISO vs. CIO: Where security and IT leadership clash (and how to fix it)

Why a push for encryption backdoors is a global security risk

Governments in the UK, US, and Europe are pressuring tech companies to weaken encryption in the name of security. The latest push from the UK government demanding Apple create a backdoor to encrypted iCloud data is just one example, one that should ala… Continue reading Why a push for encryption backdoors is a global security risk

We’re Backfilling and Cleaning Stealer Logs in Have I Been Pwned

Presently sponsored by: Report URI: Guarding you from rogue JavaScript! Don’t get pwned; get real-time alerts & prevent breaches #SecureYourSite

I think I’ve finally caught my breath after dealing with those 23 billion rows of stealer logs last week. That was a bit intense, as is usually the way after any large incident goes into HIBP. But the confusing nature of stealer logs coupled with an overtly long

Continue reading We’re Backfilling and Cleaning Stealer Logs in Have I Been Pwned

Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added five security flaws impacting software from Cisco, Hitachi Vantara, Microsoft Windows, and Progress WhatsUp Gold to its Known Exploited Vulnerabilities (KEV) catalog, base… Continue reading Cisco, Hitachi, Microsoft, and Progress Flaws Actively Exploited—CISA Sounds Alarm

Posted in Uncategorized