Home Authors Posts by CISOMAG

CISOMAG

3853 POSTS 0 COMMENTS

Supply Chain Security – A CISO Point of View

0
Recent news about the SolarWinds compromise and Trojan horse introduced in their software raises a question: How can organizations ensure the security of their...

Darkside Ransomware Gang Adopts New Extortion Technique by Targeting Stock Traders

0
Cybercriminals often try innovative methods in their attacking techniques to increase their success rate and evade security detection (obfuscation). From new malware variants to...

HCL Technologies and IBM Join Forces to Build Modern SOC Platform

0
On April 27, 2021, two tech giants – HCl Technologies and IBM – announced a collaboration, which will help streamline threat management services through...

Think Before You Scan! Malicious QR Codes in the Wild

0
Since the outbreak of the COVID-19 pandemic, people across the globe have encountered dramatic changes in their daily lives. From the way we used...

Leveraging Security Psychology to Mitigate Cybersecurity Risk

0
Problem Statement: Human risk is real, and information and cybersecurity awareness trainings are not assuring and adequate. Period. Often security trainings are compliance-focused, as against...

U.S. Space Command to Launch New Cyber Center for Better Cyber...

0
Cybersecurity is a critical element for the smooth functioning of a business. Having the right security solution works wonders for an IT architecture for...

Eaton Releases Patches to Fix Severe Vulnerabilities in its Intelligent Power...

0
Eaton, a power management solutions provider had some severe vulnerabilities in its Intelligent power management (IPM) solution, which potentially allowed threat actors to penetrate...

Ransom Mafia Extort Money By Forming Ransomware Cartels

0
The adage “Apes Together Strong,” denotes apes working together for a common goal that would eventually benefit them. Similarly, several cybercriminal groups join hands...

In IT Security, All Roads Lead to Identity

0
The increasing use of cloud services and automation solutions or even the switch to remote work has made identity the new perimeter security. With...

Months After the Breach, Threat Actors Leaked Database of 20 Mn...

0
The pandemic has given a lift to e-commerce platforms. Due to the social distancing norms, travel restrictions, and curfews, people all over the world...

MOST POPULAR

RECENT POSTS