Domain name registrars track domain name owners via "whois" data, which is a crucial tool for investigators combating cybercrime. But Kroll's Alan Brill says that since the EU General Data Protection Regulation went into effect, many registrars no longer publicly share such information, and that's a problem.
Perimeter defenses are nothing new, and when it comes to cybercriminals and ransomware purveyors, they’re getting better at evading perimeter defenses.
Once they’ve gotten in, they’re hiding in network blind spots, operating using encrypted traffic and targeting cloud workloads. What if you could turn this...
An early eBook from the CyberTheory Institute library, co-authored by founder, Steve King, and Cliff Kittle, a frequent contributor to our corpus of thought leadership, this time about Zero Trust and its influence from the principles of Maneuver Warfare.
Based upon the rapid increase in malware variants designed to...
Digital transformation is well established in the business IT space, but it’s a different story for industrial process
control. Because reliability and safety are so critical to industries like oil and gas, these industries are more
cautious about adopting the newest technologies.
But what are the best ways to...
Cybersecurity experts have been
and remain concerned about a potential attack on the U.S.
election infrastructure. With Russian interference
in the 2016 elections, the U.S. Department of Homeland Security (DHS)
Cybersecurity and Infrastructure Security Agency
(CISA) undertook the mission to ensure free and...
Calls are growing for an investigation into how commercial Pegasus spyware developed by Israel's NSO Group gets sold to autocratic governments and used to target journalists, lawyers, human rights advocates and others, with some lawmakers saying "the hacking-for-hire industry must be brought under control."
Ahead of presenting a long-term review of national security strategy in Parliament on Tuesday, U.K. Prime Minister Boris Johnson issued a statement calling for a boost to the country’s capacity to conduct cyberattacks on foreign adversaries.
European lawmakers are once again considering encryption policies and attempting to strike a balance between the privacy and security afforded by strong encryption and law enforcement's needs. But with encryption being a cornerstone of the internet, is there any new balance to be struck?
The latest edition of the ISMG Security Report features an analysis of how President-elect Joe Biden is expected to renew international relationships needed in the fight against cyberattacks. Also featured: the pandemic's impact on cybercrime; analysis of Europol's annual cybercrime report.
The U.K. NCSC responded to over 700 cyber incidents over a 12-month period, 200 of which were related to the COVID-19 pandemic, according to the cyber agency's annual report. NCSC also notes that's it's preparing to step-up its response to cyber incidents involving the NHS and vaccine development.
After a federal judge blocked an order that would have banned ByteDance-owned TikTok from operating within the U.S., the Commerce Department vowed to continue to defend the Trump administration's executive order. Additional court hearings over the order are scheduled for later this year.
The latest edition of the ISMG Security Report analyzes the U.S. indictment against Russian hackers who were allegedly behind NotPetya. Also featured: A discussion of nation-state adversaries and how they operate; an update on Instagram privacy investigation.