Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.
An effective security control program should focus on people and processes and not just technology, says Ashwin Ram, cybersecurity evangelist with Check Point. Ram also shares his insights on data breach trends.
A critical component within millions of consumer and enterprise IoT devices has dangerous software flaws. New research from Forescout Technologies into open-source TCP-IP stacks shows millions of devices from 150 vendors are likely vulnerable.
It's common for security researchers to be ignored when reporting a software vulnerability. The latest example - vulnerabilities found by Independent Security Evaluators in a router made by China-based Tenda.
If an organization fails to stop a ransomware attack, how does it recover the data? Backups, of course, are essential. But Peter Marelas of Dell Technologies says organizations should have a well-developed strategy for backups because attackers are increasingly targeting those systems as well.
After several years of discussion, Australia's Parliament passed a mandatory breach notification/disclosure law in February. It requires organisations to notify affected consumers and regulators, ensuring transparency in an era of ever-increasing cyberattacks. Although large organisations generally follow the advice...
The financial risks to organizations from data breaches come from a variety of angles, from share price hits to class-action lawsuits to fines from regulators to reputational damage. As such, the insurance industry has jumped full steam into cyber. Larger insurers are already helping companies spot and mitigate...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.