CISOMAG
EC-Council Launches a Specialized Web Application Hacking and Security Certification
Albuquerque, New Mexico, August 3, 2021: EC-Council, creators of the Certified Ethical Hacker certification, have launched their latest training and certification program specifically for...
“I expect security options to evolve over time with the rollout...
The potential threat posed by cyberterrorism has crippled both government and security experts. Whether it is cable news, newspapers, websites or social media, “cyberthreat”...
How to Ensure Data Management Excellence
In response to high-profile data breaches, staggering fines, and rapidly evolving privacy and data requirements, CIOs and CISOs are facing a critical mandate: to...
CISA Unveils Joint Cyber Defense Collaborative to Boost Cybersecurity
The increase in the number of cybercriminal groups and ransomware cartels makes it difficult for organizations to stop the threat single-handedly. Cyber collaborations from...
Ransomware Reality in 2021: Victims Paid Up to $45 Million in...
A 2021 report from Atlas VPN pegs ransomware cost to victims at $45 million in 2021. The year also boasts of some largest payouts...
How a 12-Year-Old Path Traversal Flaw Went Unnoticed
Security issues and unpatched vulnerabilities in Wi-Fi devices like routers enable threat actors to infiltrate into other vulnerable IoT devices in the same network....
“I am eagerly waiting for more innovation in incident response and...
According to Israel National Cyber Directorate, Israeli cyber companies raised $3.36 billion in the first half of 2021, an amount that constitutes about 41%...
After Power Sector, Chinese Threat Actors Prey on Telcos in Southeast...
Threat actors often target high-profile organizations in critical sectors to spread their attack vector to a larger extent. From power plants to food processing...
Federal Agencies Score Poor in Securing Sensitive Data: Senate Report
Companies lose trust when they fail to protect user data or implement necessary security advancements. Organizations bear the blame whenever attackers exploit unpatched vulnerabilities...
A CEO’s Guide to Cybersecurity
Agile methodologies and cloud-based services and models have become popular, and in accordance with this change, the c-suite has restructured processes within their organizations....