Mark Frogoso, VP and Group CISO at Mynt, the largest fintech company in the Philippines and the operator of the No.1 e-wallet in the country - GCash, says that IoT and cloud technologies, digital transformation, digital realities, AI/ML and quantum computing are the technology trends that hold the most promise.
Are ransomware-wielding criminals running scared? That's one likely explanation for the sudden release this week of free, master decryption keys for three different strains of formerly prevalent ransomware: Maze, Sekhmet and Egregor.
OMB on Wednesday released a federal strategy to move the U.S. government toward mature zero trust architectures. White House officials say the new strategy - with a focus on MFA, asset inventories, traffic encryption, and more - is a key step in delivering on Biden's May 2021 executive order.
U.S. President Joe Biden today signed a National Security Memorandum that aims to improve the cybersecurity of national security systems. The memo gives new powers to the NSA to oversee cybersecurity improvements such as the use of the multifactor authentication, encryption and endpoint detection services.
In ransomware attacks, cybercriminals attack through the backups because they know that security practitioners rely on backups to save themselves after a ransomware attack. Therefore, it is essential to have multiple backups, says Tom Kellermann, head of cybersecurity strategy at VMware.
The drive towards digital transformation and cloud has exposed organizations to unknown vulnerabilities and various forms of threats and attacks, resulting in cybercriminals stealing sensitive data.
There has been a compelling need for enterprises to protect sensitive data and reduce the scope of compliance...
In a multinational effort led by the Dutch National Police, authorities seized servers and web domains used by DoubleVPN, a Russia-based company that allegedly provided a safe operating infrastructure for cybercriminals, according to Europol.
Security specialists are offering preliminary feedback on Microsoft's sneak peek at the new security measures to be included in the Windows 11 operating system, which is slated for release in December.
In the digital world, data-smart security translates into decision-smart growth. Creating a resilient organization built on trust requires a new mindset. IT leaders today are using use data intelligently in security decision-making—and ensuring they have the right infrastructure, systems, and culture as reliance on...
What do the world's leading encryption and security experts think about non-fungible tokens, supply chain attacks, coordinated vulnerability disclosure and the state of quantum computing? The cryptographers' panel at RSA Conference 2021 addressed all these issues.
The ongoing pandemic has driven massive changes in business operations, including increased remote work and accelerated cloud transformation. But while those have enabled organizations to be more agile, they also pose multiple compliance and operational challenges, says Todd Moore, vice president of encryption...
Can courts trust evidence collected by Cellebrite's mobile device forensic tools? Matt Bergin of KoreLogic has found new vulnerabilities in Cellebrite's software that he will present on Friday at Black Hat Asia. He says that forensics software should be put through rigorous penetration tests.
Law enforcement agencies use forensics tools from Israeli company Cellebrite to gain access to locked mobile devices and extract data. But the creator of encrypted messaging app Signal says he's found vulnerabilities in Cellebrite's tools, raising questions about whether the extracted data can be trusted.