Rapid patching and adoption of updated software has long been a "must do" security imperative. But as WannaCry demonstrated, many organizations have yet to master the patch-management challenge, says Jack Huffard, president and COO of Tenable.
Some security practitioners in India are questioning the value of the government setting up a CERT for the financial sector as well as a second Cyber Coordination Centre in Delhi to help deal with the changing cyber threat environment.
Worried about the use of encryption by terrorists, Australia plans to lobby its key signal intelligence partners at a meeting in Canada for the creation of new legal powers that would allow access to scrambled communications. But Australia says it doesn't want backdoors. So what does it want?
The cost of a data breach can throw businesses into turmoil and derail careers. And that cost continues to rise. The potential for significant damage is massive on servers like IBM's Power Systems servers running IBM i, because they're widely used for database management, financial data processing, and business...
Publicis Groupe CISO Thom Langford discusses how best to measure your organization's true risk appetite and the business value of blending storytelling techniques into your security awareness programs.
Many organizations are at a disadvantage when they come up against today's cyber criminals. On one side are the criminals: sophisticated, well-funded, adaptive - always looking for new tools, techniques, procedures, and vectors to breach networks. On the other side are the defenders, hampered by legacy security...
Hackers can breach air-gapped voting machines and tallying systems in an attempt to alter ballots to sway the outcome of an election, a Senate panel has learned. Also, at the hearing, DHS discloses that Russian hackers targeted 21 state election systems before the 2016 election.
A new dump from WikiLeaks has revealed an apparent CIA project - code named "CherryBlossom" - that since 2007 has used customized, Linux-based firmware covertly installed on business and home routers to monitor internet traffic and exploit targets' devices.
Former U.S. CISO Gregory Touhill says the federal government must rethink how it hardens its workforce to prevent cyberattackers from succeeding. Organizations, he says, should regularly conduct cybersecurity exercises to help build their cyber defense.
The city of Dubai has launched a revised cybersecurity strategy that offers voluntary guidance for businesses and government units. Some observers say it represents a substantial improvement over earlier efforts, while others say it fails to articulate an action plan to help secure UAE against new threats.
In an in-depth interview, Radhakrishnan G. Menon, global head of IT for Indian biopharmaceutical company Biocon, describes the company's diverse initiatives designed to help protect intellectual property.
Good news: The Neutrino exploit kit - once a major exploit kit player - appears to have disappeared from the cybercrime scene. While it's unclear if Neutrino is gone for good, rivals have already filled any gaps in the market.
As the cyber threat landscape dramatically changes and cybercriminals become more innovative, organizations in all business sectors need to change their detection and defense strategies, says Tarun Kaura, Symantec's director of solution product management for Asia Pacific and Japan.