Shirin Hamid, an experienced cybersecurity and IT professional, is expected to begin as the CIO and Director of the IT Department at the International Monetary Fund (IMF) in January 2022.
October 20, 2021, marked the first anniversary of the creation of the Department of Homeland Security’s Center for Countering Human Trafficking. The center is taking a holistic, victim-centered approach to counter these crimes.
Malware authors often take advantage of vulnerabilities in popular software. But, malware is also prone to bugs and coding errors, causing it to crash and serve as backdoors — any method by which authorized and unauthorized users can get around normal security measures and gain high-level user access — for white hat hackers.
The second Voice of SecOps report from Deep Instinct revealed that the average time elapsed before a company responded to a cyberattack was 20.9 hours globally. The report surveyed 1,500 cybersecurity professionals about their top cyber concerns.
Calendly announced the appointment of Frank Russo as its first chief information security officer. Russo will oversee application security, infrastructure security, corporate security, privacy and compliance to protect customers, partners, employees, systems and assets.
A new Report, “Ransomware in Focus,” based on a survey of more than 250 Chief Information Security Officers (CISOs), cited ransomware as the #1 threat facing businesses and one of the primary CISO concerns for the next 12 months, with many believing an attack is inevitable.
Transportation Security Administration (TSA) officers detected a record number of firearms at airport security checkpoints this year, establishing a 20-year record with three months remaining in the calendar year and fewer passengers traveling due to the pandemic.
In Security's latest Women in Security Edition of The Security Podcasts, Meredith Wilson talks about how enterprise security professionals can prepare their organizations for geopolitical risks.
Axio's 2021 State of Ransomware Preparedness report reveals that organizations are not equipped to defend against ransomware due to deficiencies in implementing and sustaining basic cybersecurity practices, including managing privileged administrator credentials and ensuring visibility of supply chain risk.