VMware is warning all vCenter Server administrators to patch their software to fix a serious vulnerability that could be used to execute arbitrary code as well as a separate authentication flaw. Experts warn that these and other recent flaws are likely to be targeted by ransomware gangs.
Diego Souza's main responsibility as the global CISO at Cummins Inc. is focusing on the gap between IT and OT security and effectively communicating risk and other security issues to the board. But his passion is developing and mentoring the next generation of cybersecurity leaders.
The IT Revolution we have experienced over the last few years has forced organizations to their own security revolution. The degradation of the perimeter, the growth of BYOD devices, cloud migrations and human behavior are all factors that can bring an organization to its proverbial knees.
What must an...
Rather than waiting for an alert, threat hunters proactively assume that an advanced adversary operates inside the network and operates to find their existence.
Download this white paper and learn:
What threat hunting is;
How to incorporate threat hunting into your security program;
6 steps to creating an...
In this eBook, SentinelOne outlines some of the challenges and best practices for staff suddenly faced with a transition from office-based work to remote work.
Download the eBook and learn:
Best practices for employees working from home;
Defending against the psychology of fear, uncertainty and doubt;
5 things...
Thanks to cloud-native technologies and versatile microservices, organizations are innovating and performing at warp speed — and their stakeholders expect no less. But to stay at the top, achieving observability into increasingly complex systems is more important than ever.
Read the 12 Immutable Rules for...
5G technology reminds us that, globally, our sensitive data is open to attack. Janine Darling, founder and CEO of STASH Secure Data, is committed to resolving that vulnerability challenge.
"They’re playing games," is how one security expert describes Conti ransomware-wielding attackers' "gift" of a decryptor to Ireland's crypto-locked health service, while still demanding a ransom to not leak stolen health data. The same could be said of the DarkSide gang's promised retirement.
In the digital world, data-smart security translates into decision-smart growth. Creating a resilient organization built on trust requires a new mindset. IT leaders today are using use data intelligently in security decision-making—and ensuring they have the right infrastructure, systems, and culture as reliance on...
Technology advancements today allow for faster & more powerful platforms which are used by Media & Entertainment (M&E) industry to push the creative boundaries more than ever. The consumption of streaming services and other digital content has exploded, creating the need for faster rendering options. There is a strong...
As security technologies become more sophisticated, cyber criminals have fewer methods to breach computer systems. As a result, attackers are hunting for new infiltration methods. As most security leaders are aware, the BIOS has emerged as a new avenue for attack. This means organizations must adapt their security...
In the wake of recent attacks on supply chains and critical infrastructure, Adrian Mayers says it's time for cybersecurity to be seen as an issue of national defense, and that cybersecurity leaders throughout the private and public sectors must embrace their role to protect national interests.
The COVID-19 pandemic created unique conditions for technology and surveillance practices to erode global privacy. In this discussion of their RSA Conference keynote, Niloo Howe and David Cole share their research, case studies and analysis.
Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.