Sponsored CEOs and CIOs need to start accepting “red” security dashboards. Two CISOs explain why... No plan survives contact.
Sponsored Flooded airports, DORA, and IT-security siloes: Cohesity's Mark Molyneux on cyber-resilience Many organisations "don't understand the capabilities that IT can provide to security and that security can provide to IT" says the Barclays veteran. CIOs and CISOs should...
ransomware US healthcare ransomware attack impact worsens, as government ramps up pressure and lawsuits start "An immense crisis demanding immediate attention" says the American Medical Association
CNI Less talk, more action on CNI cyber resilience, say White House advisors "Almost no information is currently available to indicate how an organization is preparing for future cyber-physical challenges. This has to change."
Members only banks Europe's banks steel themselves for a tough ECB cyber resilence test after blistering criticism "Institutions continue to report gaps in risk control areas considered fundamental to cyber hygiene, such as proper identity and access management, timely vulnerability patching or network security"
Members only data breaches Okta breach looks worse as BeyondTrust, Cloudflare, 1Password report impact, flag concerns Concern at IAM vendor Okta's response mounts as BeyondTrust details concerns, Cloudflare calls for customers to press harder on "further information regarding potential impact to your organization"
cyberresilience CRA(P): Will Europe throw the open source baby out with the bathwater? "The major concerns are that the responsibility for compliance would fall on the wrong parties..."
Members only CISO Kroll blasts T-Mobile after SIM swapping attack enables data breach: CISOs, listen up... Security leaders would do well to revisit this month's findings of the Cyber Security Advisory Board (CSRB)...
MTTD Combating hacker dwell time: Why mean time to detect (MTTD) alone can’t be trusted MTTD, as things currently stand, cannot be relied upon exclusively as a metric to measure the effectiveness of data breach detection.
Cybersecurity Recovering from ransomware: Are your backups enough? Some victims can't start restoring because their backup solution requires AD to log in
Cybersecurity Bolster your VMware ESXi security: Novel malware ecosystem identified Malware avoids EDR, attains persistence, is highly stealthy