Ordr has tapped Jim Hyman, a former COO and Zscaler's first non-engineering hire, to fill the CEO job. Hyman is tasked with deepening the connected device vendor's bond with security stalwarts like Cisco and CrowdStrike and moving beyond opportunistic partnerships in favor of a concerted strategy.
Federal regulators are urging healthcare sector entities to identify all instances of OpenSSL in their infrastructures and to test and deploy a patch issued to fix certain severe vulnerabilities in the software as soon as possible.
The OpenSSL Project downgraded the urgency of a patch issued Tuesday after determining that the vulnerability is unlikely to be exploited in common situations. "It appears to be there would be an almost zero quantity of servers at risk," said a Sophos cybersecurity executive.
Should Australia's Medibank health insurer pay extortionists to prevent the release of sensitive medical documents related to millions of Australians? There's no easy answer to remedying what is the most severe cybercriminal incident in Australian history.
Organizations expect the IT security landscape to be consistent - from builds and hardware to operating systems - but for product security, everything Honeywell makes is a snowflake with flexible, highly tailored design across many technologies, says Honeywell Product Security Chief James DeLuccia.
North Korean state hacking group Kimsuky is developing Android malware targeted at South Korean users by disguising the apps as legitimate apps including a Google security plug-in and a document viewer. Seoul-based cybersecurity company S2W dubs the apps FastFire, FastSpy and FastViewer.
Many ransomware-wielding attackers - including big-name groups - have been collectively shooting themselves in the foot by resorting to "amateur" tactics, including decryptors that fail to decrypt as well as gangs re-extorting the same victims. Cue fewer victims opting to pay a ransom.
Elon Musk lugged a sink into Twitter headquarters to announce his takeover of the social network. But it will take more than a porcelain prop for the richest person in the world to successfully surmount the cybersecurity, legal, disinformation, regulatory and other challenges facing Twitter.
Forescout will get its fourth CEO since September 2020 as the IoT security firm lays off an unspecified numbers of employees. Wael Mohamed will exit day-to-day management after just 19 months in the top role in a tenure punctuated by the acquisitions of CyberMDX and Cysiv.
Cybereason has carried out another round of layoffs, axing 200 workers just days after a report that the endpoint security vendor is pursuing a sale. The company plans to reduce its staff by 17% - or 200 employees - less than five months after laying off 10% of its workforce.
Artificial intelligence-driven technology purporting to recognize human emotional states "may not work yet, or indeed ever," said U.K. Deputy Information Commissioner Stephen Bonner. The office predicts greater commercial use of behavioral analysis in products over the next two to three years.
An inquiry into European Union countries' use of Pegasus spyware is running into national opposition, said Jeroen Lenaers, head of the investigative committee. Pegasus can invoke national security sensitivities, Lenaers acknowledged, but said the inquiry is concentrated on questions of law.
Apple has issued a slew of security updates amid reports that its iOS devices are being actively exploited via a zero-day vulnerability in the kernel. While Apple hasn't attributed the exploits to any specific group, experts say surveillance malware developers are a likely culprit.
Cybereason has abandoned its IPO plans altogether and hired JPMorgan Chase to find a buyer, The Information reported Friday. Why is Cybereason no longer poised to make it to the IPO Promised Land? An unfavorable competitive environment and a muddled go-to-market strategy provide some clues.
Is Australia's data breach wave a coincidence, bad luck or intentional targeting? Maybe all three. But the security weaknesses that have led to the incidents are not exotic. And the people behind these attacks are most likely workaday cybercriminals, not top-level nation-state attackers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.