Home Authors Posts by CISOMAG

CISOMAG

3853 POSTS 0 COMMENTS

EC-Council Launches a Specialized Web Application Hacking and Security Certification

0
Albuquerque, New Mexico, August 3, 2021: EC-Council, creators of the Certified Ethical Hacker certification, have launched their latest training and certification program specifically for...

“I expect security options to evolve over time with the rollout...

0
The potential threat posed by cyberterrorism has crippled both government and security experts. Whether it is cable news, newspapers, websites or social media, “cyberthreat”...

How to Ensure Data Management Excellence

0
In response to high-profile data breaches, staggering fines, and rapidly evolving privacy and data requirements, CIOs and CISOs are facing a critical mandate: to...

CISA Unveils Joint Cyber Defense Collaborative to Boost Cybersecurity

0
The increase in the number of cybercriminal groups and ransomware cartels makes it difficult for organizations to stop the threat single-handedly. Cyber collaborations from...

Ransomware Reality in 2021: Victims Paid Up to $45 Million in...

0
A 2021 report from Atlas VPN pegs ransomware cost to victims at $45 million in 2021. The year also boasts of some largest payouts...

How a 12-Year-Old Path Traversal Flaw Went Unnoticed

0
Security issues and unpatched vulnerabilities in Wi-Fi devices like routers enable threat actors to infiltrate into other vulnerable IoT devices in the same network....

“I am eagerly waiting for more innovation in incident response and...

0
According to Israel National Cyber Directorate, Israeli cyber companies raised $3.36 billion in the first half of 2021, an amount that constitutes about 41%...

After Power Sector, Chinese Threat Actors Prey on Telcos in Southeast...

0
Threat actors often target high-profile organizations in critical sectors to spread their attack vector to a larger extent. From power plants to food processing...

Federal Agencies Score Poor in Securing Sensitive Data: Senate Report

0
Companies lose trust when they fail to protect user data or implement necessary security advancements. Organizations bear the blame whenever attackers exploit unpatched vulnerabilities...

A CEO’s Guide to Cybersecurity

0
Agile methodologies and cloud-based services and models have become popular, and in accordance with this change, the c-suite has restructured processes within their organizations....

MOST POPULAR

RECENT POSTS