News

Noberus Amps Its Tactics: How IT Leaders Can Keep Up with Evolving Ransomware
InformationWeek

Noberus Amps Its Tactics: How IT Leaders Can Keep Up with Evolving Ransomware

Ransomware descended from the tool used in the Colonial Pipeline attack in 2021 has been leveraging new tools, tactics, and procedures. What does this evolving threat mean for its potential targets?
The tools and strategies schools need for ransomware defense
Cybersecurity Dive

The tools and strategies schools need for ransomware defense

CISOs empathize with the unenviable position schools are in as they confront ransomware. The right capabilities could make a big difference.
Is there an expiry date for connected vehicle software support?
Automotive World

Is there an expiry date for connected vehicle software support?

The IEEE flags some unanswered questions that need to be addressed in the move to connected vehicles. By Megan Lampinen
The truth about quantum risk cryptography and being ‘quantum safe’
VentureBeat

The truth about quantum risk cryptography and being ‘quantum safe’

With experts suggesting that quantum computers will decrypt public key algorithms by 2030, quantum risk cryptography is becoming vital.
What you need to land a six-figure cybersecurity job
Fortune

What you need to land a six-figure cybersecurity job

Earning a master's degree in cybersecurity can be one path to earning a six-figure salary, but trainings and certifications can also get you there.
The CISO Experience
Infoseclive

The CISO Experience

Save the date for a very special “The CISO Experience” hosted by myself with our star guest Kayne McGladrey taking a Macro Economic view of the industry. Kayne...
Cybersecurity hiring remains red-hot—the industry to surpass $400 billion market size by 2027
Fortune

Cybersecurity hiring remains red-hot—the industry to surpass $400 billion market size by 2027

The cybersecurity market continues to grow as the number of cyber attacks increases every year and talent numbers fall short.
Exploring the Advantages of Deploying DPUs in the Data Center
CIO

Exploring the Advantages of Deploying DPUs in the Data Center

Members of the Foundry/IDG Influencer Network weigh in on this increasingly important technology.
An Interview with Kayne McGladrey
Onalytica

An Interview with Kayne McGladrey

Kayne has recently featured in Onalytica's Who is Who in Cybersecurity report.
Vigilance and Planning: Experts Share Their IT and Data Security Strategies
CSO Online

Vigilance and Planning: Experts Share Their IT and Data Security Strategies

IT and security leaders take proactive approaches to secure and protect IT environments amid the evolving threat landscape.
Top 4 IoT data privacy issues developers must address
TechTarget

Top 4 IoT data privacy issues developers must address

API permissions, AI data set bias, device pervasiveness and physical access are all considerations IoT developers should add to the design process.
Denial of Service Attacks Expected To Get Bigger, Nastier
DataCenterKnowledge

Denial of Service Attacks Expected To Get Bigger, Nastier

And we thought 2021 was already bad enough.
Security in 2022 – Ransomware, APT groups and crypto exchanges pose key challenges
Security Magazine

Security in 2022 – Ransomware, APT groups and crypto exchanges pose key challenges

Heading into 2022, business leaders and security professionals have many challenges to deal with. For many, the year ahead will feel like the movie “Groundhog Day,” as most businesses and organizations continue to work to find a proportional response to ransomware.
Thinkers360 Predictions Series – 2022 Predictions for Cybersecurity
Thinkers360

Thinkers360 Predictions Series – 2022 Predictions for Cybersecurity

Thinkers360 2022 Predictions for Cybersecurity are part of a series providing actionable insights for business and technology executives
Watch: Supply Chain Congestion: A Golden Opportunity for Hackers
SupplyChainBrain

Watch: Supply Chain Congestion: A Golden Opportunity for Hackers

Kayne McGladrey, senior member of IEEE, offers valuable tips on how supply chains can shore up their cybersecurity at a time when threats from hackers are greater than ever. Global supply chains have been under intense strain in recent months, a situation that has been made even worse by the growth of cyber attacks, especially in the form of ransomware. The transportation sector, which has been largely deregulated, needs to adopt recommendations by industry and government organizations for implementing measures that they might have overlooked . . .
Reduce the risk of cyber attacks with frameworks, assessments
TechTarget

Reduce the risk of cyber attacks with frameworks, assessments

To reduce the chances of falling victim to large-scale cyber attacks, organizations must identify and mitigate threats. Learn why a framework is necessary.
When More is Not Necessarily Better: The Impacts of Multiple Security Tools
CIO

When More is Not Necessarily Better: The Impacts of Multiple Security Tools

Variety may be the spice of life but deploying lots of data protection and backup tools brings several issues professionals must address, according to security experts.
IEEE Transmitter

How Infrastructure + Technology Will Move Us Forward

Long-term resilience and technology-driven advancements will ultimately evolve our infrastructure for the betterment of society and humanity.
The Smart Office Brings New Capabilities and Added Risks
CMSWire

The Smart Office Brings New Capabilities and Added Risks

The rapid development and deployment of workplace technologies, coupled with the adoption of new ways of working, comes with added risks.
Sinclair TV Stations Targeted in Weekend Ransomware Attack
GovInfoSecurity

Sinclair TV Stations Targeted in Weekend Ransomware Attack

Sinclair Broadcast Group, Inc., which owns or operates 186 television stations across 87 U.S. markets, has been hit with a ransomware attack that has disrupted