Exclusive, insightful audio interviews by our staff with careers/security leading practitioners and thought-leaders
Analysis: Russia's Sandworm Hacking Campaign
This edition of the ISMG Security Report features an analysis of the impact of a hacking campaign linked to Russia’s Sandworm that targeted companies using Centreon IT monitoring software. Also featured: a discussion of CIAM trends; a critique of Bloomberg's update on alleged Supermicro supply chain hack.
Tips on Building a Robust Data Backup Strategy
In light of the threat of ransomware attacks, healthcare organizations need to take extra steps to ensure their systems are adequately backed up - and that those backups are protected, says Martin Littmann of Kelsey-Seybold Clinic. He'll be a speaker at ISMG's Virtual Cybersecurity Summit: Healthcare.
Becoming a CISO: Many Paths to Success
Mike Hamilton, founder and CISO of CI Security, followed an unusual path that led him to a career in cybersecurity. He says those who, like him, lack a formal education in security can build successful CISO careers.
Why Synthetic Identity Fraud Persists
Julie Conroy of Aite Group and Shai Cohen and Lee Cookman of TransUnion analyze a new report that explains why synthetic identity fraud poses a long-term threat.
Analysis: Implications of Water Treatment Plant Hack
The latest edition of the ISMG Security Report features an analysis of the critical security issues raised by the hacking of a Florida city water treatment plant. Also featured: The CISO of the World Health Organization discusses supply chain security; hackers steal celebrities' cryptocurrency.
Account Takeover in 2021 - and How to Prevent It
SpyCloud has fresh research into account takeover trends and finds that attacks have recently spiked by 300%. Chip Witt explains the trends behind the stats and offers insight into what enterprises often are overlooking in their ATO prevention strategies.