Two Chinese nationals have been indicted by the U.S. Justice Department for allegedly laundering $100 million in cryptocurrency stolen by North Korean hackers in 2018.
Malware defenses today too often function as black boxes, producing binary results that make it difficult for security teams to prioritize, when what's needed is transparency, to enable defenders to better understand threats and prioritize their response, says Mario Vuksan, CEO of ReversingLabs.
As RSA 2020 neared its close, RSA President Rohit Ghai visited ISMG Studios to discuss the event's theme, "The Human Element," as well as digital risk management and the pending sale of RSA.
In a joint interview at the RSA 2020 conference, Edna Conway of Microsoft and Wendy Nather of Cisco discuss how to apply "zero trust" to supply chain security.
The U.S. is late to the 5G race. But there are multiple strategies that policymakers can pursue to facilitate the near-term rollout of safer and more trusted 5G networks across the country, says Michael Chertoff, executive chairman of The Chertoff Group and Department of Homeland Security secretary.
In 2019, the Global Cyber Alliance debuted its toolkit to help small and midsized organizations bolster cybersecurity. How has the toolkit been received and refined? Phil Reitinger, who heads the alliance, discusses progress.
CISO stress levels are higher this year than last. What is the impact on these individuals and their enterprises? And what should be done to alleviate this stress? Stuart Reed of Nominet analyzes the latest CISO Stress report.
In an RSA 2020 conference keynote, Cisco's Wendy Nather spoke of "democratizing security" - thinking differently about the people we serve and secure. She expands on that theme and discusses her role as head of advisory CISOs at Cisco's Duo Security unit.
"Identity is the new perimeter" is a common refrain. But what does it mean specifically in the healthcare context? Wes Wright, chief technology officer at Imprivata, discusses the challenge of securing digital identity in this sector.
What are enterprises seeking in their next CISO - a technologist, a business leader or both? Joyce Brocaglia of Alta Associates shares insights on the key qualities she's looking for when recruiting CISOs.
WatchGuard Technologies has released its latest Internet Security Report. CEO Prakash Panjwani draws on that research to discuss attack trends, cloud security and how to mitigate the global skills shortage.
Deception technology has come of age in the marketplace, but there is still some customer confusion about the distinct use cases. Ofer Israeli, CEO of Illusive Networks, shares how mature companies deploy deception.
Visser Precision, a U.S. manufacturer that supplies Boeing, Lockheed Martin, Tesla and SpaceX, appears to have been hit by the DoppelPaymer ransomware gang, which has begun leaking internal data and threatening to leak more unless the victim pays a ransom.
APIs are exposing a lot of business logic to exploitation, says Shreyans Mehta, co-founder & CTO and Cequence Security, who offers insights on enhancing API security.
Ex-federal CISO Gregory Touhill, a retired general, understands the global staffing crunch. Now, as president of AppGate Federal and as a board member for ISACA, he shares new insights on how to tackle cybersecurity recruiting and retention.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.