With hackers using ransomware and other attack methods to compromise high-value privileged user credentials, organizations need to take a serious look at how they approach their cyber defense. Here’s where to start.
If we want to escape from “cyber hell” – then professionals will need additional training, not only to learn the latest technology, but also to understand public policy and organizational management. Howard Shrobe is looking to change this through professional education initiatives at MIT.
An IT security professional realizes that his life’s mission to protect information harks back to being a curious youngster who absconded his teacher’s log-in credentials and then poked around the school’s rudimentary computer network. Little did he know, a rewarding career lay ahead.
With numerous breaches and a record number of compromised records; 2016 was the year of the mega breach. Expert Tin Zaw explores credential stuffing attacks that follow these mega breaches -- and the impact they have on society.
Malicious actors are wasting no time in kicking off 2017…in the past week we’ve seen an active and growing ransom campaign against over 10,000 unsecured Internet-facing data MongoDB instances. Here expert Jason Garbis explores this situation a bit more, and then takes a step back for some analysis.
With more than 25 years’ experience in the IT field, ISACA Director Jo Stewart-Rattray has a lot of experience and advice to share. Determine what you want to do in technology, find your own path, and make it happen. And until you’ve actually tried something, don’t place imaginary obstacles in your own path.
Thanks in part to research and testimony by Flashpoint, two hackers responsible for developing malware that infected over 50 million computers have been sentenced to prison. Expert Lance James from Flashpoint walks us through the history of arrests that likely halted what could have been the most prolific and undetectable botnets distributed to date.