What threats and challenges are CISOs and CROs most focused on?

Cyber executives may not be sufficiently prioritizing threats from vulnerabilities within the value chain, beyond the immediate boundaries of their own organizations, according to Tata Consultancy Services. When asked to rank where companies will see t… Continue reading What threats and challenges are CISOs and CROs most focused on?

What NATO’s virtual rapid response cyber capability means for the fight against cyber warfare

At the recent meeting of the North Atlantic Council in Madrid, NATO heads of state agreed to boost resilience to cyber and hybrid threats. NATO members will strengthen their cyber defenses through enhanced civil-military cooperation, and expand industr… Continue reading What NATO’s virtual rapid response cyber capability means for the fight against cyber warfare

Product showcase: Group-IB Unified Risk Platform

The cyber threat landscape has intensified. Threat actors are organized and professionalized, with ransomware gangs outsourcing the first step of their operations to Initial Access Brokers. This alliance has proven profitable for both sides, as the ill… Continue reading Product showcase: Group-IB Unified Risk Platform

Detection, isolation, and negotiation: Improving your ransomware preparedness and response

The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have proliferated in the last decade. The numbers are staggering if not overwhelming, … Continue reading Detection, isolation, and negotiation: Improving your ransomware preparedness and response

State Department cyber strategy emphasizes proactively hunting for threats

The new strategy focuses on improving the State Department’s intelligence bureau’s cybersecurity so that it can better protect the top secret information it collects.

The post State Department cyber strategy emphasizes proactively hunting for threats appeared first on CyberScoop.

Continue reading State Department cyber strategy emphasizes proactively hunting for threats

Board members and the C-suite need secure communication tools

Board members and the C-suite are key targets for cyber-threat actors, due to their access to highly sensitive information. Yet too many of them are putting their organizations in harm’s way with daily use of personal email to communicate sensitive top… Continue reading Board members and the C-suite need secure communication tools

Cyber criminals continue to target and exploit people

Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege — and how threat actors continue their ceaseless creativity as they exploit the… Continue reading Cyber criminals continue to target and exploit people

Fraud trends and scam tactics consumers should be aware of

If it seems like you’re receiving more spam than normal, you probably are. Seventy-four percent of consumers say they have received a scam text so far this year, while as many as 83% have received a scam phone call, according to Allstate Identity Prote… Continue reading Fraud trends and scam tactics consumers should be aware of

How confident are IT pros in the security of their organization’s supply chain?

Over the last two years, supply chain challenges have rocked both enterprises and consumers alike, making it harder to access certain goods and maintain business continuity. Security threats have only heightened these concerns, and an ISACA survey repo… Continue reading How confident are IT pros in the security of their organization’s supply chain?