How ransomware works
If your security team hopes to defend against emerging ransomware attacks, it is essential to know the business model of the attackers. Understand the business and you can develop defenses to break it.
If your security team hopes to defend against emerging ransomware attacks, it is essential to know the business model of the attackers. Understand the business and you can develop defenses to break it.
Fitzgerald, chairman of the executive committee of Cybersecurity Collaborative, says soft skills will have a greater impact on a CISO’s long-term career than technical ones.
SC Media spoke with Sheldon Cuffie, enterprise chief information security officer of American Family Insurance, as part of a series of security leadership profiles prepared in partnership with Cybersecurity Collaborative.
Instead of punishing or shaming your team for failing phishing simulations or similarly exercises within your training module, use analytics to see where they’re falling short and uncover why.
The attacks have been spread out between the U.S., Europe, and Asia, and have included HPC clusters as well as university systems, a large internet service provider, personal systems, and marketing and hosting firms.
Your end users are your biggest source of risk. To mitigate this risk, you train and educate your users on security policy, but training and education is not enough.
If 2020 brought deadlines tied to various privacy and data protection policies, then 2021 means compliance – with less leniency for companies that fall short of regulations.
Vaccine distribution could mean a return to offices, but most experts expect a new hybrid model to emerge. Pile that on top of the already challenging situation posed by a supposed skills gap and efforts to improve diversity, and the cybersecurity community may need to redefine workforce priorities.
Enhanced email security? Growth of digital identities? Vulnerability management born from mergers and acquisitions? No more VPNs? Here, cybersecurity experts offer their take on what strategic shifts we should expect within the enterprise.
Cyber experts expect more sophisticated attacks to come – with ransomware and phishing continuing at a steady, but more advanced clip, and emerging threats tied to deepfakes and 5G beginning to show impact.