US Treasury sanctions a cryptocurrency mixing site for supporting North Korean hackers who have been stealing hundreds of millions of dollars. Blender.io is a virtual currency mixing site that obfuscates the origins of cryptocurrency coin transactio
Getting a foothold in the cyber security career could be a daunting task for entry level professionals including graduates or career switchers, as cyber industry now is aligning towards skill-based hiring practices compared to formal education requir
Ransomware attacks and payments are increasing, with most revenue going to Russian attackers. It is time to revisit outlawing Ransomware payments.
Some stats to hammer the situation home:
Sophos ransomware report indicates:
- Ransom attacks are more fre
Multi-cloud? What it really means? Is it really another approach towards risk segregation towards ensuring resilient IT infrastructure? We have seen a lot over last few decade. How IT evolved and we realised that enough is not enough. And indeed, da
Thanks to DynamicCISO for a great discussion about the changing landscape of cybersecurity and how we must all adapt to drive trust into the global digital ecosystem. The key to our success is to think ahead and show leadership in managing innovation
Expert Panel | CISO Burnout Series | Part 2
Topic "CISO Burnout Tips: Addressing Through Organizational Culture and Cyber Maturity"
About CISO Platform
CISO Platform is the world's first online community solely dedicated for information senior se
- Session brief
- Watch Panel video (on-demand)
- Executive Summary
Session Brief :
In this panel, industry experts discuss the growing need for 'The challenge of CISO burnout'. CISO is an operation extensive role, it gets harder wi
CISO burnout is a serious issue and through this discussion, we try to find out the impact of this issue on organizations and individuals. The CISO role is operation intensive and gruelling. In most cases CISOs remain in an organisation for about 1 t
Happy Privacy Day to all those privacy professionals out there that work to make our digital world more safe, respectful, and private.
Now more than ever, respecting privacy in our rapidly digitizing world, is important. Over the past many years, pri
Norton recently announced its Anti-Virus product will have a new feature that enables mining of Ethereum cryptocurrency for their customers, if they choose to participate. Is this a nice benefit for users or a reckless move to that increases overall
Ransomware is a growing scourge. Is it possible to eradicate this entire class of attacks? I think it is but in today’s Cybersecurity Insights interview I have a lively debate with Malcolm Harkins on criminalizing ransomware payments and different ap
Technology can be mesmerizing. We are all lured by the seemingly endlessly tantalizing stream of emerging technologies that promise to connect and enrich our lives. But there is a potential dark side. For every great innovative benefit, there are acc
We're talking about the latest Java-based vulnerability CVE-2021-44228. Recently, a critical Zero-day vulnerability has been found in log4j which permits Remote Code Execution (RCE) allowing the attackers to get remote access. The Vulnerability got
New Fixes Added for CVE-2021-45046, CVE-2021-45105
Background on Apache log4j 2
Apache log4j 2 is an open source Java-based logging framework, which is leveraged within numerous Java applications around the world. Compared with the original log4j 1.X r
Note: this page contains paid content.
Please, subscribe to get an access.