The CrowdStrike outage exposed recovery challenges, highlighting cloud systems' resilience over physical infrastructure. Jonathan Hatzor, co-founder and CEO of Parametrix, advises CIOs and CISOs on strategies that can effectively manage, mitigate and transfer risks.
As cyberattacks continue unabated and the cost of ransomware increases, insurance claim payouts exceed insurance premiums. The insurance industry can’t sustain these conditions and is working to right the ship.
In this paper, we explore the state of cyber risk insurance and how insurers react to the current...
In the ransomware attack that disrupted U.K. pathology services provider Synnovis and is still causing thousands of canceled and delayed operations and appointments across London, the attackers reportedly demanded a $50 million ransom, backed by the typical threat to leak stolen data.
The success of any cybersecurity uplift program hinges on the wider recognition of the value of cyber protection initiatives and their active adoption and advocacy, says Dr. Siva Sivasubramanian, an accomplished CISO and C-suite executive.
Artificial intelligence has emerged as a game-changer in the pharmaceutical industry. CB Insights' report "AI Strategies for 11 of the World's Largest Companies 2024" found how large pharma companies, such as Eli Lilly, Novo Nordisk, and Johnson & Johnson, are using generative AI in drug discovery.
Sheetal Venkatesh, senior director, product management, Cohesity, and Steve Grossenbacher, director, product marketing, Zscaler, discuss double-extortion ransomware, Cohesity and Zscaler's collaboration, and the power of AI-driven solutions for sensitive data protection.
In today's cybersecurity landscape, where threats such as ransomware evolve rapidly, organizations must shift their cybersecurity approach from technology-based to risk-based, said Niloofar Razi Howe, chair of the board, Pondurance. Opposite of that, she said, is to respond to threats as they come.
Generative AI tools, such as ChatGPT and GitHub Copilot, hold promise for cybersecurity enhancement. Kevin Schmidt, director analyst at Gartner, explores AI's potential for bug detection, threat monitoring and easing SOC burdens, along with organizational challenges.
Russian authorities have reportedly arrested three accused members of the SugarLocker ransomware-as-a-service operation. Their alleged crime? Targeting Russians, although one suspect has also been tied to a massive hack of Australian health insurer Medibank and a subsequent data leak.
A Chinese-speaking cybercrime group with the codename GoldFactory has built a new Android and iOS banking Trojan, GoldPickaxe, that can harvest and steal personal details, including biometric face profiles, that attackers use to create AI-driven deepfakes to fool bank defenses, researchers warn.
Ukrainian cyber defenders report that fast-acting Russian military intelligence hackers have been targeting government agencies as well as organizations in Poland using backdoor malware tied to phishing lures based on a fake letter from the Ukrainian deputy prime minister.
Microsoft has deactivated a tool designed to simplify the installation of Windows applications after hacking groups began exploiting the functionality to distribute malware loaders, leading to infections involving backdoors and ransomware.
October has been designated the Cybersecurity Awareness Month since 2004. Various organizations - both public and private - engage in activities and campaigns to educate individuals and businesses about the risks and best practices associated with online security.
India ranks among the bottom five on Harvard's Belfer Cyber Power Index 2022, while China, its primary adversary, is at a strong number two position. Lt. Gen. (Retd.) R S Panwar says a national cyber strategy with an offensive approach is imperative.
It shook the world when nearly 11 media companies, including The Guardian and The Washington Post, received a classified list of documents from a Russian cybersecurity contractor firm named Vulkan. Kukreja discusses safeguarding businesses by a stricter adherence to "assumed breach" principles.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cio.inc, you agree to our use of cookies.