The Cybersecurity and Geopolitical podcast returns with Ian Thornton-Trump (CISO at Cyjax) and Tristan de Souza taking a sweeping look at some of the main protagonists on the global stage right now: Russia, China, Iran and North Korea. Security magazine brings enterprise security and risk professionals this entertaining and illuminating podcast on the latest challenges and intriguing flashpoints within cybersecurity and the geopolitical landscape.
In the tense political and economic climate, state-backed actors have used every possible means to gain leverage over their rivals. And in the midst of the chaos, every individual and organization can become a victim or collateral damage in the context of bigger conflicts. Here’s a glimpse of where we are and how organizations can protect themselves going forward.
Satellites are already being used across critical organizations, including militaries, governments and healthcare, increasing the stakes of a cyberattack. But no matter the size or purpose of an organization, security must be top of the agenda for this space race.
A new study finds that one in four consumers admit to using their work email or password to log in to consumer websites and applications such as food delivery apps, online shopping sites and even dating apps.
When it comes to cybersecurity, companies still have a lot of work to do to find ways to anticipate and avoid data breaches. Let’s take a look at a few of the most notorious cybersecurity attacks that have happened over the last few decades and see what you and your enterprise can learn.
Traditionally, security operations centers (SOC) used tools such as endpoint detection and response (EDR), network detection and response (NDR), and security information and event management (SIEM), but as a result of the rush to remote work, many security teams have found their tools are now blind to many new and emerging threats.
Yes, you need one. But who do you turn to? Inept ransomware negotiators have left companies in worse shape than they found them in by inciting threat actors to do even more damage. The best approach is to engage a ransomware negotiator before you’re attacked, so they can work with you to create a sound crisis response plan. What should you look for when hiring a ransomware expert to drive crisis planning and response at your enterprise?