Pular para o conteúdo principal

Postagens

Mostrando postagens com o rótulo IoT

A caminho de uma Guerra Cibernética Mundial

  Os conflitos geopolíticos da atualidade não se restringem apenas em disputas territoriais, mas se dão também no mundo digital, com diversos atores participando ativamente. O colunista da Security Report, BISO e Advisor de Segurança da Informação, Rangel Rodrigues, destaca que a melhor forma de defesa é a adoção de uma postura igualmente corporativa, abraçando as tecnologias emergentes e adotando conceitos essenciais de Cibersegurança, como o Zero Trust *Por Rangel Rodrigues Nunca a humanidade vivenciou ciberguerras como nos conflitos atuais entre Rússia e Ucrânia e, mais recentemente, entre Israel e Palestina, onde ambos os lados usam o poder e conhecimento computacional para proteger seus segredos por meio de barreiras no contexto de Segurança física e lógica. Felizmente, a tecnologia avançou e existem inúmeras alternativas para lutar e se defender de uma possível Guerra Cibernética Mundial. Os recursos já estão disponíveis. Por exemplo, o impulsionamento da Inteligência Artific...

New CISO Intelligent Issue 46

New CISO Intelligent Issue 46 Rise of ransomware - How this attack method is destabilizing cyber-insurance - and what to do Cybersecurity collaboration - Importance of collaborating to keep up with the ever-evolving threat landscape Inspiring the future - How the younger generation can help to close the cybersecurity skills gap Security Delivery - Erik Hart, CISO at Cushman and Wakefield, explains how the company relies on Mimecast to protect its email systems and to ensure continued information security innovation Cyber trends - Get ready for public extortion serious scams and AI; cyber in 2022 and beyond Infographic - Trend Micro study reveals urgent need for new way to discuss business risk Threat updates - Latest updates from across the globe, the US and Italy How much of a concern is protecting critical infrastructure and how should organizations go about doing this pragmatically? How ransomware is destabilizing cyber Insurance - and what to do about it Business surveillance - The...

Dado é o novo petróleo. Mas e a privacidade no Metaverso?

Sem dúvida, as integrações tecnológicas com uso de AI, Machine Learning, realidades virtual e aumentada, biometria e dispositivos trazem inúmeras possibilidades para a inovação dos negócios. Mas as estratégias de incluir esse novo universo no cotidiano das empresas estão levando em conta a importância de proteger os dados dos usuários? 20 pontos de riscos e alertas para o CISO *Por Rangel Rodrigues Desde primórdios da Internet, provedores, bancos e serviços online enfrentaram o desafio de proteger os dados de seus clientes que eram capturados para um propósito, seja para assistir o cliente ou para interesse comercial. Nesta época, a preocupação da privacidade já era colocada em pauta. Naturalmente, a Internet evoluiu agregando valor em muitas áreas, como a imersão no mundo digital e web em nossos bolsos. Por outro lado, também passou a ser usada pelo lado oculto; a engenharia social, sequestro de contas, roubo de informações, pichação de sites, pedofilia e privacidade, aspectos que pas...

New CISO Intelligent - Issue 45

New CISO Intelligent - Issue 45 Tailoring Security - Leon Shepherd, CIO, Ted Baker, tells us how one of Britain’s leading fashion brands relies on Darktrace’s AI technology to protect its digital systems and how the solution enables the company to focus on higher-value tasks. 2022 priorities - Attivo Networks experts share their evidence-based forecasts for the next 12 months. Healthy protection - NCSC protects vaccine rollout and mitigates record number of cyber incidents. Budgetting Investimento - Five best practices for maximizing security on a tight budget. Cyber trends - Cybersecurity predictions: Identity protection to be a priority in 2022. Infographic - 70% of security and IT pros find security hygiene and posture management challeging. What trends do you expect to develop in the cybersecurity space in 2022? Why data storage is an integral part of a CISO’s IT security strategy. CISOS on the front line: What’s ahead for cybersecurity in 2022. More than half of UK business plan t...

Intelligent CISO - Issue 43

Intelligent CISO - Issue 43 Ransomware pandemic - How business can implement the right tools to better protect themselves Zero Trust fears - Shedding light on the anxiety surrounding this cybersecurity approach Goveming bodies unite - Coming together to target ransomware attackers to critical infrastructure Secure Access - Eberhard Haugh, CISO, DB Schenker, tells us how the company - as one of the leading global logistics providers - extended its existing identity and Access Management (IAM) infrastructure to secure employee access Latest intelligence - Latest white papers from Bitdefender an Weston Cyber trends - The ransomware pandemic and how business can protect themselves Threat updates - Latest updates from across the globe, the United States and the United Kingdom Barracuda introduces data classification capabilities to help customers find sensitive data CloudBees survey reveals C-suite supply chain security concerns The ransomware pandemic and how business can protect themselve...

CSO: Don't Ignore Vulnerability Management!

Thinking like a hacker, knowing how to exploit loopholes by creating or editing code, and understanding how security holes are used can help you understand and manage patch and patch application. Two months ago I mentioned in an article “Advance to 'Next Level' Security” the challenge of keep a system or service up to date by the time the vulnerability is discovered versus the time to apply a patch mid-2000. Notorious that manufacturers on the one hand developed new software consequently brought new vulnerabilities and the most exploited at that time was the webservers, whether on Unix platform, Linux or Windows were not yet mature. Of course, services such as DNS, FTP, Telnet, Netbios, among others, were also massacred. Crackers used their ability to create exploits to exploit vulnerabilities in Internet services, and at the time, as I worked for an American bank, it was many early hours to update the environment and fix web server failures. Although it was run was challengin...

Intelligent CISO Issue 41

Intelligent CISO Issue 41 - CISOs driving blindfolded - How CISOs are overcoming limited visibility after COVID-19 triggered increase in cyberattacks - Physical security - The procedures data centre leaders should have in place to ensure their facilities are secure - Consctructing robust security - Achieving a comprehensive risk-based cybersecurity strategy in the construction industry - Accelerating security - Keith O’Gorman, GISSM at Archroma, discusses how the organization relies on Edgescan technology to continuously scan its systems for vulnerabilities across its IT infrastructure - Cyber trends - Survey reveals UK CISOs driving blindfolded, with limited visibility and control - Infrographic - Australian capital market firms respond to new risk management demands - What procedures should data centre leaders have in place to ensure their facilities are physically secure? - Ransomware, phishing, Zero Trust and the new normal of cybersecurity - Security is a journey, not a destinati...

Intelligent CISO Issue 40

Intelligent CISO Issue 40 - Voice of the CSO - Proofpoint research shines light on security challenges and key priorities - Ransomware avoidance - Experts discuss the precautions to take to avoid a ransomware attack - Security planning - Why a change in approach in required, rather than a budget increase - Cybersecurity Vision - Andreas Schneider, Group CISO at TX Group, tells us how the Swiss media company worked with Cyberreason to extend TX Group’s detection and response capabilities across cloud services and infrastructure - Infographic - VMware report reveals surge in cyberattacks targeting the anywhere workforce - Editor’s question - What are the precautions security leaders should be taking to avoid a ransomware attack? - Feature - Protecting from the cyber kill chain evolution - Expert opinion - The cumulative effector ransomware and the lessons for UK national infrastructure - Business surveillance - Why the board needs to give their CISO a seat a the table - CISOs area under...

A new issue of Intelligent CISO Issue 39 publication has been published

A new issue of Intelligent CISO Issue 39 publication has been published - Proactive defense - Ensuring a resilient cyber infrastructure with a reliable threat hating approach - Data loss prevention - The basics of backup and how to avoid desaster - Passwordless future - Experts discuss whether passwords are a thing of the past - Investing in Security - Simon Mair, Head of Information Security and Data Privacy at Brewin Dolphin, discusses how the leading wealth management company ensures the security of both its client and company data - Cyber trends - Report finds up to 300% increase in attacks from opportunist targeting - Editor’s question - What are the challenges and pitfalls CIOs make when designing their network security? - Predictive intelligence - A perfect storm for supply chain attacks - Expert opinion - Why attackers continue to target the network - Decrypting myths - Experts discuss whether passwords are still fit for puporse - ISC2 and University of Mary Washington deli...

Flexible Security - A new issue 38 - Intelligent CISO magazine

Flexible Security - A new issue 38 - Intelligent CISO magazine  - Flexible Security -> Fiedrich Wetsning, CISO and Vice President of Enterprise It at Flex, tells us how the company achieved a unified approach to defend against cyberthreats with Palo Alto Networks - Future of passwords -> Experts discuss the need for security leaders to re-evaluate their approach to password security - Skills shortage -> Fortinet announces its new offering to reduce the cyber skills gap - CISO priorities -> Expert reveals the priorities that should be covered in every CISO’s budget - Predictive Intelligence -> A closer look at the impact of cloud video surveillance: What does it mean for CIOs? - Feature -> Why organizations need an open, cloud-based platform to build security into their hybrid It environments - Expert opinion -> XDR - The future of threat detection and response - Business surveillance -> Unblurring the lines between physical and cybersecurity - Decrypting my...

Ajustando a abordagem para interromper ataques

Rangel Rodrigues, advisor em Segurança da Informação, destaca em seu artigo um chamado para os profissionais de SI mudarem o mindset diante dos riscos cibernéticos com resiliência e ações proativas Não basta ter as melhores soluções implantadas se o mindset dos colaboradores e gestores continuam com uma visão turva, permitindo que pequenos pecados capitais de segurança ocorram em virtude da falta de tempo ou devido ao excesso de atividades que precisam ser feitas. Ignorar um relatório de vulnerabilidades com 600 issues ou não saber como agir diante de um incidente de ransomware não pode ser mais uma desculpa. O fato é que em muitas empresas, homens de negócios e profissionais de TI ainda tentam buscar o caminho mais fácil por natureza para driblar o dilema da segurança. Com isso, aceitam riscos iminentes mediante uma pressão e, às vezes, a falta de incisão e resiliência dos profissionais de infosec nestas situações podem tornar o projeto de segurança um desastre. O tempo talvez seja o ...

A new issue of Intelligent CISO Issue 37 publication has been published.

A new issue of Intelligent CISO Issue 37 publication has been published - Cyber Schooling - Cyber Trends - Industry expert says 2021 is the year of recover ware - CXO Research: 58% of data backups are failing, leaving data unprotected - Lasted updates from the Netherlands, United Kingdom, Singapore and UK/US - What is the consequence of organizations continuing to underestimate the level of damage cyberthreats can do and what can be done to avoid this? - Expert says CISOs need to take lateral movement seriously - Expert Opinion - From the C-suite to IT: Identifying anomalous behavior to stop digital adversaries in their tracks - Cybereason expert discusses securing the financial sector now and into the future - Oman sees 30% drop in COVID-19 cyberattacks to 640 in Q3 2020 - Cisco report finds crypto mining malware activity affected 69% of customers in 2020 - Cloud services: A threat vector for healthcare industry - Are we more vulnerable to scams than even before? Read more: https://...

A new issue of Intelligent CISO Issue 35 publication has been published.

A new issue of Intelligent CISO Issue 35 publication has been published. - Will a passwordless future help us ensure effective cybersecurity? - Tem importante of collaboration on the Zero trust journey - New Telecoms security law to protect UK for cyberthreats - How BT drives security from a necessity to a beacon of business responsibility - Cyber trends - Cyberattacks on hospitals spike by 45% worldwide - UAE banks participate in first national cyberwar gaming exercise - Kaspersky reveals drop in DDoS attacks but crypto mining in on rise - Report reveals cyber-risk to critical and industrial infrastructure reaches all-time high - Why organizations need an open, cloud based platform to build security into their hybrid IT environments - World’s most dangerous malware disrupted through global action - Using automation to overcome the thorny problem of data truth for improved cybersecurity strategies - Building a human firewall to address insider threats - Why cybersecurity will set busin...