By Mitch Parker
Academic Healthcare CISO
In this three-part series, Academic Health care CISO Mitch Parker shares his insights on ransomware, incident response and best practices for building a world class prevention program.
Ransomware has been the buzzword du jour for the past year in computer security. This mostly unsophisticated attack type uses deception and already-existing means of communication to destroy the integrity of systems and shut down businesses by holding their critical assets for cryptocurrency ransom via encryption.
Adversaries could use virtual machines to remove evidence of activity
Learn how virtual machines could allow the cyber-criminals avoid detection. Red Cloak revealed threat actors creating and attempting to launch a VM in a compromised system.
Software vulnerabilities, lost hard drives and CDs, malicious insiders, poor security – the UK’s most important data breaches reveal just how many ways data can be put at risk
Far from the almost-quaint days of viruses and keyloggers, the somewhat abstract threat of cyber attacks has evolved into something more concrete. As infosec crosses the bridge from cyberspace to the physical we ask: is it possible to hack a plane?
The first installment hit on visibility – now, we’re diving into the importance of accountability
Learn how accountability is crucial to your data security and servers as a major element in the new Information Security Triad.
By Randy Marchany
Virginia Tech CISO
No network is impenetrable, a reality that business executives and security professionals alike must accept. The traditional perimeter focused approach to cybersecurity has often failed to prevent intrusions, especially in an application-focused paradigm.
By Pritesh Parekh
Zuora VP & CSO
Information is at the heart of today’s modern businesses, which is why now, more than ever, security professionals need to take a proactive approach to security to protect this valuable asset.
The first step to defining your security strategy is to determine how much your organization should be investing in security.
Planning is crucial to minimizing and recovering from malicious ransomware attacks
Read ransomware security tips and learn why planning is crucial to minimizing and recovering from malicious ransomware attacks.
By Grace Crickette
San Francisco State University Interim AVP of Business Operations
In this series, Grace Crickette provides C-Level executives a comprehensive overview of cyber insurance, while addressing business impacts and offering best practices for implementing a risk-management strategy that includes a cyber-liability policy.
Part Three: Risk Management and Insurance Basics
Insurance and Risk Management Basics
Insurance is just one tool in the Risk Managers belt, but sometimes it is their favorite tool. Why?
Security professionals have been taught the Security Triad – Confidentiality, Integrity and Availability – but there’s another triad just as critical to data protection
Security professionals know of the Security Triad – Confidentiality, Integrity and Availability – but there’s another triad just as critical to data protection. In this article, we begin with visibility.