Top Officials Again Push Back on Ransom Payment Ban

Due to multiple reasons, the Institute for Security and Technology’s Ransomware Task Force threw cold water on the need for a ransomware payment ban in a report released Wednesday.

How Exposure Management Elevates Cyber Resilience

Attackers are adept at identifying and exploiting the most cost-effective methods of compromise, highlighting the critical need for organizations to implement asset identification and understand assets’ security posture in relation to the network.

Cybercriminal Adoption of Browser Fingerprinting

Numerous pieces of data can be collected as a part of fingerprinting, including Time zone, Language settings, IP address, Cookie settings, Screen resolution, Browser privacy, and User-agent string.

How to Design and Deliver an Effective Cybersecurity Exercise

Armed forces have always utilized war-gaming exercises for battlefield training to prepare for times of conflict. With today’s digital transformation, the same concept is being applied in the form of cybersecurity exercises.

Reinforcement Learning is the Path Forward for AI Integration Into Cybersecurity

AI algorithms and machine learning can cull through immense volumes of data efficiently and in a relatively short amount of time. This can help defenders sift through a never-ending supply of alerts and identify those that pose a possible threat.

Shadow AI is the Latest Cybersecurity Threat You Need to Prepare For

Shadow IT – the use of software, hardware, systems, and services that haven’t been approved by an organization’s IT/IT Sec departments – has been a problem for the last couple of decades, and a difficult area for IT leaders to manage effectively.

Fake Data Breaches: Countering the Damage

Amid the constant drumbeat of successful cyberattacks, some fake data breaches have also cropped up to make sensational headlines. Unfortunately, even fake data breaches can have real repercussions.

Red Teaming in the AI Era

Unlike previous types of software, AI models become more intelligent over time. This constant change means new risks can emerge at any moment, making them incredibly difficult to anticipate. A one-and-done approach to red teaming simply won’t work.

Surviving the “Quantum Apocalypse” With Fully Homomorphic Encryption

Quantum computing has the potential to break cryptosystems that are the foundations of the technology protecting the privacy of data and information created and shared every day.

Infosec Teams Must be Allowed to Fail, Argues Gartner

Zero tolerance of failure by infosec professionals is unrealistic, and makes it harder for cybersecurity folk to do the essential part of their job: recovering fast from inevitable attacks, according to Gartner analysts Chris Mixter and Dennis Xu.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags