Home Blog Page 87
How substantial is cybersecurity compliance to engendering reliability in data protection processes? While we may defer answering this question, the importance placed on cybersecurity for ensuring compliance with internal or external regulatory requirements is evident from increased privacy and...
G7 nations have signed a new ministerial declaration to enhance online safety and security worldwide. The digital and technology ministers from the U.K., Canada, Germany, France, Italy, the U.S., and the EU have agreed on a range of recommendations...
Recent research titled “Moving Forward: Setting the Direction” highlighted that healthcare supply chain security is one of the lowest-ranked areas for the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF) conformance. According to the research, only 44% of hospitals...
Combating rising ransomware attacks has become a challenge for organizations globally. Several ransomware groups are targeting companies by encrypting their systems, paralyzing operations, and threatening to leak the stolen data on darknet forums. With a common goal to thwart...
Recent news about the SolarWinds compromise and Trojan horse introduced in their software raises a question: How can organizations ensure the security of their supply chain? By Kevin Reed, CISO at Acronis I am not alone in this and there were...
Cybercriminals often try innovative methods in their attacking techniques to increase their success rate and evade security detection (obfuscation). From new malware variants to different hacking methods, threat actors constantly change their approaches to encrypt victims’ data and pressurize...
On April 27, 2021, two tech giants – HCl Technologies and IBM – announced a collaboration, which will help streamline threat management services through a unified modern security operation center (SOC) platform. It will also help security teams with...
Since the outbreak of the COVID-19 pandemic, people across the globe have encountered dramatic changes in their daily lives. From the way we used to communicate to the way we worked, the pandemic has affected every facet of our...
Problem Statement: Human risk is real, and information and cybersecurity awareness trainings are not assuring and adequate. Period. Often security trainings are compliance-focused, as against assurance-focused. Agree? By Ashish Paliwal, Information Security Officer, Sony Scare Tactic Email scams related to COVID-19 surged 667%...
Cybersecurity is a critical element for the smooth functioning of a business. Having the right security solution works wonders for an IT architecture for now and the future. Keeping this in mind, the U.S. government announced the launch of...