It shook the world when nearly 11 media companies, including The Guardian and The Washington Post, received a classified list of documents from a Russian cybersecurity contractor firm named Vulkan. Kukreja discusses safeguarding businesses by a stricter adherence to "assumed breach" principles.
The German Federal IT security agency has set security levels for manufacturing companies. An organization aspiring for Level 5 (the highest level) must prove that all its suppliers and vendors in its supply chain are also certified for Level 5. This ensures consistency in security along the supply chain or value...
A report on the status of cybersecurity in the healthcare industry indicates that cyberattacks are declining or remaining flat. Cyber attackers were still targeting medical services, hospitals and clinics, medical device manufacturers and pharmaceutical firms in Q2 2023.
IoT systems, devices, and sensors are becoming vital to enhancing customer and employee experiences, reducing operational costs, improving productivity, and achieving corporate ESG goals. It's imperative to adopt standards that mitigate supply chain risks from poorly secured IoT devices.
The construction industry in Vietnam is on a rapid digitalization drive yet faces certain challenges. Unpatched software and outdated systems by construction companies, suppliers and contractors are leading to increased data breaches. Here's what RICONS is doing to counter this and support its vision.
A cyber incident strategy helps businesses become compliant with new SEC disclosure rules. It can also reduce risks and cost of breach. But how does one go about creating a cyber incident strategy, and what are its essential elements?
Just like privacy and cybersecurity, enterprise architecture should be an essential part of an organization's strategic road map. Don Welch, CIO of New York University, advises integrating enterprise architecture into organizational culture and business strategy.
SOC analysts, security practitioners and CISOs are overwhelmed with the sheer volume of telemetry data due to the increase in attacks. Triaging can no longer be done by humans today. But BlackBerry is reducing this burden by embedding AI/ML into its enterprise security offerings.
Shifting from encryption, threat actors are now resorting to data exfiltration to exert pressure on enterprises, demanding ransom for the protection of valuable data and reputation. CIOs and CISOs must disrupt the playing field by deploying deception and embracing other innovative methods.
To counter cyberthreats, governments, world over, must enhance cybersecurity and technology governance, while promoting coordination, information sharing and investment in modern defenses. These measures will help in safeguarding crown jewels against nation-state actors and address evolving threats.
With the growing reliance on digital technologies and the escalating sophistication of cyberthreats, organizations need to be prepared for potential cyber incidents and establish the ability to recover from them, according Rubrik's Abhilash Purushothaman.
According to a recent report, 48% of IT professionals reported an increase in ransomware attacks with 22% of organisations experiencing a ransomware attack in past 12 months and 51% of enterprises not having a formal ransomware plan.
Ransomware-as-a-Service is quickly rising with more sophisticated methods of...
Verizon Business released the results of its 16th annual Data Breach Investigations Report, which examined 16,312 security incidents and 5,199 breaches in 81 countries. Similar trends were observed in EMEA and APAC regions, though there were variations in attack patterns over the years.
Yigal Unna, former DG, National Cyber Directorate, Israel, emphasized the importance of continued collaboration between defenders and the formation of a Global Cyber Cabinet consisting of more than 20 national CISOs from leading countries working to dismantle cybercrime syndicates.
The positive impact that ransomware has had is that more security executives and boards now talk about cybersecurity and cyber resilience within their businesses. Security budgets are staying flat or increasing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cio.inc, you agree to our use of cookies.