In cybersecurity, it has long been assumed that the attacker has the advantage and that defenders must deploy a disproportionate amount of resources (time, money, etc.) to even try and maintain some parity. In this piece, we’ve conducted interviews with two successful CISOs to provide insight into how they view security alpha issues. Mark Weatherford is a highly experienced and successful CISO who has worked in the public sector at both the state and federal level and also as a CISO for multi-billion dollar commercial organizations. Our Global FS CISO currently works as the Global CISO at one of the largest financial services firms in the world and has 25 years of experience working on cybersecurity and risk management issues.
Their responses provide direct insight into how they work to improve the ROI of their program and increase attacker cost.
In Brno, Czech Republic, a major hospital has been hit by a mysterious cyberattack amidst a COVID-19 outbreak that is beginning to spread across the European country. The hospital, Brno University Hospital, stated that the incident postponed urgent surgical interventions. The cybersecurity incident also re-routed new acute patients to a
A campaign that started in October is being used to deliver financial malware against entities in the manufacturing and retail sectors. Researchers at the Cybereason Nocturnus group have been following the new campaign closely, determining that it commences with a phishing attack to deliver TrickBot and ultimately delivers a relatively
European security agency Enisa has identified the groups it believes are the biggest threat to 5G networks. Enisa warns that threats to telecoms infrastructure will increase with the arrival of 5G and next-generation mobile connectivity. 5G will present a wide array of risks, from automated factories to connected cars, attracting
“Websites that never go away continue to bring security threats to their owners, says a new report. Old Web applications don’t go away — they linger and spread security vulnerabilities around their organizations. These ‘ghost sites’ are critical assets for criminals and weaknesses for enterprises, according to a new report
“More than 80% of surveyed routers had, on average, 172 security vulnerabilities, new research shows. Research conducted by the American Consumer Institute Center for Citizen Research indicates that the routers commonly found in homes are huge security vulnerabilities for consumers and their employers. The center’s analysis shows that of 186
What your organization should be doing to proactively managing corporate security culture and workforce expectations as it prepares to prevent, detect, and respond to insider risk incidents.