The recent encounters with Spectre and Meltdown techniques, owing to faults in its microprocessors has shaken the world’s largest chipmaker, Intel. With little options but to introduce safety measures to preserve its brand reputation, a new internal security group...
In view of the increasing cybersecurity attacks on small businesses, the Australian Small Business and Family Enterprise Ombudsman has launched a cybersecurity guide, to aid small businesses in intercepting and blocking cyber-breaches. Most of these businesses are ignorant of...
By Grant Bourzikas, CISO, McAfee
With the growth of digital world, we have seen growth in cyberthreats. These range from the annoying to the downright catastrophic. And as these threats evolve and permutate, we have also seen the evolution of a...
They did it in the past and they are doing it again. There’s a good possibility of North Korea burrowing through accounts and scooping away cryptocurrencies. The monster has matured, it is not into data theft anymore, it is...
CISO MAG Desk: John McAfee recently declared that his twitter account was hacked and used to endorse some minor-league cryptocurrencies. Although, he claimed to have enabled the two-factor authentication, his mobile phone was jeopardized leading to the cyber attack...
The holiday plans seem to have gone awry for the popular cryptocurrency exchange EtherDelta, as it announced the possibility of its DNS server being hacked on the Wednesday of December 20, 2017. Listed amongst the top trading platforms of...
Contributed by Chris Roberts, Chief Security Architect, Acalvio Technologies
Open letter, let’s see. I like the CISO opening, it’s truthful and it’s part of the spark for this. I’ve been vocal about endpoint being the mythical silver bullet for a...
A recent survey conducted by a software industrial company indicated that a number of industrial companies are not taking cybersecurity seriously enough. The "Putting Industrial Cyber Security at the Top of the CEO Agenda" survey, that was conducted by...
EC-Council recently surveyed its pool of Certified CISOs to discover what is important to information security executives in four categories: hiring their teams, current and past employment, looking for a job, and career success.
First, the survey collected basic geographic...
This whitepaper is contributed by Tari Schreider, Chief Cybersecurity Strategist and Author, Prescriptive Risk Solutions, LLC
Today, CISOs have a dizzying array of cybersecurity technologies offering the promise of a securer tomorrow. Each technology performs its appointed mission of protecting assets...