Ransomware-wielding criminals continue to find innovative new ways to extort victims, develop technically and sidestep skills shortages by delivering ransomware as a service, said Robert Hannigan, the former head of U.K. intelligence agency GCHQ, in his Infosecurity Europe 2021 virtual keynote speech.
As organizations prepare a plan for migrating to the Secure Access Service Edge, or SASE, model, they need to carefully assess the need for reorganization of the networking and security departments, says Nat Smith, senior director, security analyst at Gartner, which coined the SASE term.
Advanced persistent threat actors will continue to "up their game," including taking advantage of the COVID-19 pandemic even as its impact diminishes, says Kelvin Coleman, executive director of the National Cyber Security Alliance.
Criminals tricked into using an FBI-run encrypted messaging app, Verizon's 2021 Breach Investigations Report and overcoming the challenges of recruiting cybersecurity professionals are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.
The Identity Theft Resource Center, a nationally recognized nonprofit organization established to support victims of identity crime, has published new research that shows nearly 30% of people who contact the ITRC are victims of more than one identity crime.
SmiNet, Sweden’s infectious diseases database, was temporarily shut down last week by the country’s public health agency, Folkhälsomyndigheten, following several attempted cyber intrusions. The shutdown interrupted the reporting of COVID-19 statistics.
How do you provide secure, reliable wireless network connectivity for staff members who work from home? Solutions must meet the needs of both the IT team and employees.
Check out this Infographic from Cradlepoint to learn more.
When an organisation has mission-critical employees working from anywhere outside the office, technologies they’ve always relied on remain essential, but there are more barriers and variables to contend with.
The company’s visibility into and control of network connectivity and information security is a key...
Using cellular broadband for resilience and uptime in offices, stores, and other fixed locations.
This Whitepaper from Cradlepoint outlines how Wireless WAN links built on LTE and 5G technologies can boost the resilience of your business with six essential branch networking strategies:
When an organisation has mission-critical employees working from anywhere outside the office, technologies they’ve always relied on remain essential, but there are more barriers and variables to contend with. The company’s visibility into and control of network connectivity and information security is a key...
Troels Oerting, a veteran CISO who most recently served the World Economic Forum, has a storied career. He's been there, done that and mitigated the risk. In this exclusive conversation, he shares his opinions on today's threats, emerging technologies and challenges for the next generation of security leaders.
Dr. Victoria Baines, a visiting research fellow at Oxford University in the U.K., is acclaimed as one of the country’s most influential women in cybersecurity. In this video interview, she describes potential future cyberthreats as criminals adapt to the changing cybersecurity landscape.
The surge of cyberattacks on the healthcare sector in the midst of the COVID-19 pandemic has accentuated many critical cybersecurity challenges that must be urgently addressed, says Joshua Corman of the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.
In the past six months alone, we've seen the SolarWinds attack, the Microsoft Exchange Server exploits and the Colonial Pipeline ransomware strike. The threats are more imminent than ever. But Philip Reitinger of the Global Cyber Alliance believes strongly: We created this mess, and we can fix it.