Enterprise Technology Management: No Asset Management Silos
InfoRiskToday
by
21h ago
Oomnitza co-founder and CEO Arthur Lozinski discusses enterprise technology management - a solution that brings software, hardware and infrastructure asset management together in a single database and uses automation to set and enforce policies for the enterprise as a whole ..read more
Visit website
The Challenges in Keeping Medical Device Software Updated
InfoRiskToday
by
21h ago
Updating software as new vulnerabilities are discovered persistently remains a top medical device cybersecurity challenge, said David Brumley, a cybersecurity professor at Carnegie Mellon University and CEO of security firm ForAllSecure. Solving this requires a major mindset shift, he said ..read more
Visit website
UK Regulator Tells Platforms to 'Tame Toxic Algorithms'
InfoRiskToday
by
21h ago
Ofcom Prepares to Enforce the Online Safety Act The British media regulator called on online platforms including search engines to roll out safety measures for recommendation algorithms. Ensuring that systems "do not operate to harm children" is a measure the regulator made in a proposal for regulations enacting the Online Safety Act ..read more
Visit website
Live Webinar | Seamless Security: The Path to Integrated IAM Systems
InfoRiskToday
by
21h ago
..read more
Visit website
CISA Directors Talk Geopolitical Threats, Election Security
InfoRiskToday
by
21h ago
Explosion in Threat Actors, Poorly Configured Technology Compound the Risk Geopolitical events increasingly pose risks to organizations' cybersecurity posture, the current and former leaders of the U.S. Cybersecurity and Infrastructure Security Agency - Jen Easterly and Chris Krebs - warned at this year's RSA Conference in San Francisco ..read more
Visit website
Report: Undetectable Threats Found in F5's Central Manager
InfoRiskToday
by
21h ago
Researchers Discover Major Vulnerabilities in Popular Central Management Platform Researchers identified major security vulnerabilities in F5's Next Central Manager that could allow hackers to gain a persistent, undetectable presence within any organization's network infrastructure connected to F5 assets, according to a Wednesday report ..read more
Visit website
Operation Cronos Again Threatens to Reveal LockBitSupp
InfoRiskToday
by
4d ago
International Police Operation Revives Seized LockBit Dark Web Leak Site Police behind an international law enforcement operation targeting LockBit resurrected the leak site they seized earlier this year from the ransomware-as-a-service group and posted a countdown clock suggesting they will reveal the identity of LockBitSupp, the group's leader ..read more
Visit website
LevelBlue Leverages AI for Threat Intel Following AT&T Split
InfoRiskToday
by
4d ago
AI Investments and Global Expansion Set to Propel Growth After Separating From AT&T As Level Blue separates from AT&T, it is focusing on harnessing artificial intelligence for advanced threat intelligence, targeting significant growth in international markets, and evaluating potential merger and acquisition opportunities to expand its geographic or technological footprint ..read more
Visit website
How Intel 471's Buy of Cyborg Is Reshaping Threat Hunting
InfoRiskToday
by
6d ago
Why Customers Benefit From Bringing Threat Hunting and Threat Intelligence Together Intel 471 bought a threat hunting startup led by a Raytheon and Swimlane leader to help clients more effectively address complex cyberthreats. Buying Cyborg Security will bring threat hunting and threat intelligence together to beef up security posture and take proactive measures against hackers ..read more
Visit website
Correlating Cyber Investments With Business Outcomes
InfoRiskToday
by
6d ago
SecurityGate CEO Ted Gutierrez said the SEC's new cybersecurity mandates give "more teeth to the idea that cybersecurity is a business problem." He discussed the need for CISOs to link cyber risk and business outcomes and other ways in which the rules affect the field of cybersecurity ..read more
Visit website

Follow InfoRiskToday on FeedSpot

Continue with Google
Continue with Apple
OR