This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.
In an update on the investigation into the SolarWinds supply chain attack, Deputy National Security Adviser Anne Neuberger said the Biden administration is preparing "executive action" to address security shortcomings that have come to light.
In 2020, a cybercrime operation known as ShinyHunters breached nearly 50 organizations, security researchers say. And this year, it shows no signs of slowing down - it's already hacked e-commerce site Bonobo and dating site MeetMindful.
Mike Hamilton, founder and CISO of CI Security, followed an unusual path that led him to a career in cybersecurity. He says those who, like him, lack a formal education in security can build successful CISO careers.
LastPass has analyzed over 47,000 businesses to bring you insights into security behavior worldwide.
The takeaway is clear: Many businesses are making significant strides in some areas of password and access security – but there is still a lot of work to be done. Use of important security measures like...
Today’s business environment is anything but simple – and increased cyber threats just complicate things more. For employees to work efficiently and securely, you need to know who they are and what they need to access, so employees can connect seamlessly to the tools they need while you maintain oversight and...
French cybersecurity authorities are warning that widely used, open-source IT monitoring software called Centreon appears to have been hit by Russian hackers. But unlike the SolarWinds supply chain attack, in this campaign, attackers appear to have hacked outdated, unpatched versions of the software.
Bloomberg has stood firm on its controversial story from two years ago asserting that China implanted a tiny chip on motherboards made by Supermicro. But rather than proving its contention in a follow-up, it may have inflicted more reputational damage upon itself.
Remote business operations and distributed workforce has triggered an urgency for deploying new technologies, applications and cloud-native solutions. There is a lack of cohesion between threat response and implementing new security policies and configurations, and a resulting lack of essential context that shapes...
Next–generation firewalls demand streamlined, comprehensive management from rule creation to termination.
Download this solutions brief to learn how to turn complex firewall change requests into a secure, manageable and
automated workflow as well as recertification
requirements in compliance standards such as...
It’s clear that in cyberspace individual companies are struggling to keep up against
the growing volume and sophistication of attacks, despite increasing investments.
There are no easy answers to cybersecurity, but we do know that a Collective Defense
strategy — where companies, sectors, states, and nations...
As existential threats present challenges that are much greater
than any single company or organization can manage alone,
the time is now to defend together… or get left behind.
Working with leading companies across sectors, we have
identified their shared cybersecurity pain points — and ways
we are solving...
Automating security has become fundamental to supporting the speed-to-market requirements of modern application development environments. Because these environments vary across teams and organizations, security tooling must be flexible enough to enable the adaptation of security automation based on specific workflows...