article thumbnail

Analysis: 'Cybersecurity Call to Arms'

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of British spy chief Jeremy Flemming’s "cybersecurity call to arms." Also featured: Insights on COVID-19 business continuity planning; the wisdom of the late Dan Kaminsky.

article thumbnail

Analysis: Coronavirus Cybersecurity and Privacy Issues

Data Breach Today

The latest edition of the ISMG Security Report offers an analysis of cybersecurity and privacy issues raised by COVID-19 research efforts. Also featured: the latest ransomware trends and an investor's take on hot cybersecurity sectors.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analysis: How Will Biden Address Cybersecurity Challenges?

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the cybersecurity challenges the Biden administration must address. Also featured: payments security advice from Verizon; the outlook for the lifting of restrictions tied to the COVID-19 pandemic.

article thumbnail

Cybersecurity Analysis of the FTX Crypto Heist: Part Two

Data Breach Today

Hugh Brooks of CertiK shares the status of data that FTX stores, the role of regulations and best cybersecurity practices for crypto exchanges. On the heels of the recent FTX financial meltdown came the theft of millions of dollars that left thousands of investors, exchanges and others in the lurch.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Today’s technology leaders play a more strategic role in establishing cybersecurity strategy for their organizations. All of these stats beg the question, “Do you know what’s in your software?” Register today!

article thumbnail

Analysis: Cybersecurity Challenges Facing New President

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of how President-elect Joe Biden is expected to renew international relationships needed in the fight against cyberattacks. Also featured: the pandemic's impact on cybercrime; analysis of Europol's annual cybercrime report.

article thumbnail

Cybersecurity Analysis of the FTX Crypto Heist: Part 2

Data Breach Today

Hugh Brooks of CertiK shares the status of data that FTX stores, the role of regulations and best cybersecurity practices for crypto exchanges. On the heels of the recent FTX financial meltdown came the theft of millions of dollars that left thousands of investors, exchanges and others in the lurch.

article thumbnail

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

It’s mindboggling, but right now for 49% of respondents, cybersecurity is their primary business concern. Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will provide you with best practices for attack prevention and recovery.