Indian cybersecurity firm CloudSEK says another cybersecurity firm used a compromised collaboration platform credential to obtain access to its training webpages. CEO Rahul Sasi did not identify the alleged perpetrator says the hacker did not obtain access to the company code base and database.
Data management, supply chain assurance and regulatory evolution are among the topics touched upon in this look at the year ahead with Troy Leach, chief strategy officer of the Cloud Security Alliance. Find out what trends Leach is watching and the predictions he makes for 2023.
Patients of at least seven hospitals affiliated with CommonSpirit have been affected by a data breach involving the Chicago-based hospital chain's October ransomware incident. None of the affected hospitals appear to have filed a breach report with the U.S. Department of Health and Human Services.
Smartphone giant Apple says that starting later this year, users can enable end-to-end encryption of iPhone backups stored in the company's commercial cloud. Apple took pains to frame its announcement in the context of cloud computing data breaches.
Permira's $5.8 billion acquisition of Mimecast has allowed the email security vendor to make product and technology investments that don't provide an immediate financial return. Several buyers expressed interest in taking Mimecast private, and CEO Peter Bauer is glad the firm ended up with Permira.
Asset management historically either looked at network traffic or attempted to put an agent on everything, which Axonius CEO Dean Sysman says left organizations drowning in data. Axonius focuses solely on bringing data together from a customer's existing infrastructure and controls.
As a former Division 1 athlete and coach, security leader Ty Howard learned that "repetition" and "being relentless" are keys to success and were invaluable lessons for his career as a CISO. He shares how camaraderie and professional growth help inspire his team and collaboration with the IT group.
The U.K. Department for Environment, Food and Rural Affairs relies heavily on applications no longer supported by their vendor. Current levels of modernization spending are not sufficient to "reduce cybersecurity and resilience risks to an acceptable level," warns the National Audit Office.
"Who here thinks your network or environment will become more complex next year?" a cybersecurity veteran asked the audience at Black Hat Europe this week in London. As attackers' capabilities continue to improve, Jeff Moss said defenders must learn to succeed or fail faster.
Hackers, possibly North Korea's Lazarus Group, are behind a campaign that socially engineers cryptocurrency traders into opening an Excel spreadsheet loaded with a malicious macro. Pyongyang hackers specialize in cryptocurrency theft as the regime seeks hard currency to fuel weapons development.
SentinelOne plans to go after more Fortune 500 and Global 2000 organizations as the economic downturn prompts customers to shrink the size of their purchases. Over the past year, the company doubled the number of clients spending at least $100,000 and $1 million with SentinelOne annually.
A ransomware attack on a New Zealand third-party managed IT service provider affected several government agencies across the country - including the Ministry of Justice and the national health authority. Investigations are ongoing to determine the incident's full impact.
Software has increasingly relied on components developed by third parties or from open-source libraries, which Aqua Security CEO Dror Davidoff says injects additional risk. On-premises environments are still managed in more traditional ways, with the development and production phases totally siloed.
The prospect of attackers using voice impersonation, deepfake technologies and misinformation against healthcare sector entities is a serious threat that entities need to be closely monitoring, says Dave Summit, vice president of cybersecurity at Florida Cancer Specialists and Research Institute.