Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Eclypsium Joins the Joint Cyber Defense Collaborative

13 June 2024 at 08:25

Eclypsium becomes a member of CISA’s public-private partnership for cyber defense strategy Portland, OR – June 13, 2024 – Eclypsium, the digital supply chain security company protecting critical hardware, firmware, and software, today announced it has become a member of the Joint Cyber Defense Collaborative (JCDC). Founded by the Cybersecurity and Infrastructure Security Agency (CISA) […]

The post Eclypsium Joins the Joint Cyber Defense Collaborative appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.

The post Eclypsium Joins the Joint Cyber Defense Collaborative appeared first on Security Boulevard.

Don’t Panic, Take Action: What to Do If Your Data Leaks

Data leak

Recent high-profile data leaks, including incidents involving Santander and Ticketmaster, have highlighted the ongoing issue of data breaches affecting a wide array of industries, from banking and logistics to online stores and entertainment. While companies typically take steps to protect their affected clients, individuals can also enhance their digital security. Kaspersky experts offer advice on what to do if your data has been leaked. Data leaks often involve logins, passwords, addresses, and phone numbers. In some cases, they may include passport details and bank card information. While any data leak is concerning, it’s crucial not to panic. Instead, pause and consider the necessary steps to secure your information.

Data Leak? Immediate Actions to Take

1. Change Compromised Account Details: If you suspect your account details have been compromised, immediately change your password and enable two-factor authentication. If cybercriminals have already accessed your account, contact technical support to restore access and determine what other information might have been compromised. 2. Address and Phone Number Leaks: If sensitive data such as your address or phone number is leaked, it is usually not critical but still concerning. A leaked address typically doesn’t pose a threat unless it leads to targeted attacks like stalking. In such rare cases, contact the police promptly. For a leaked phone number, ensure accounts using that number as a login have two-factor authentication, change your password, and remain vigilant for potential fraud calls. 2. Passport or ID Leaks: If your passport or ID details become leaked, stay alert for potential social engineering attacks. Scammers might use your passport details to appear more credible. However, there is usually no need to obtain a new document. Using leaked passport data for fraud, such as taking out a loan, requires additional personal information and substantial criminal expertise. To mitigate future risks, avoid giving away your passport details unnecessarily—they are primarily needed for banking and e-government apps, and occasionally logistics services. 3. Bank Card Details: Act promptly if your bank card details are leaked: monitor bank notifications, reissue the card, and change your bank app or website password. Enable two-factor authentication and other verification methods. Some banks allow setting spending limits for added protection. If account and balance details are leaked, be extra vigilant against phishing emails, SMS, and calls. Cybercriminals might target you based on this information. In unclear situations, contact your bank directly. 4. Organizational Security Measures: Various types of leaked employee data can be used for OSINT (open-source intelligence) to further access internal systems. To counter these threats, organizations are advised to use advanced security solutions, implement strong cybersecurity policies, and conduct employee training. 5. Educating and Protecting Against Social Engineering: Amin Hasbini, Director of META Research Center Global Research and Analysis Team (GReAT) at Kaspersky, emphasizes the importance of being aware of data leakage risks and avoiding oversharing. He advises educating relatives, especially children and the elderly, about the dangers of social engineering attacks. "A crucial thing also is to educate your relatives, especially kids and elderly people. For example, explain that if someone refers to personal information, such as full name and even passport details, by telephone, messengers, social networks or e-mail, it’s not necessarily the bank or social service representatives, but might be scammers. In personal issues it’s advised to have a code word or question that only relatives know, while with organizations if some actions are required it’s better to use official contact information for double checking”, says Amin Hasbini, Director of META Research Center Global Research and Analysis Team (GReAT), at Kaspersky. As data breaches continue to affect various industries, individuals need to take proactive steps to secure their personal information. By following these experts' advice, you can mitigate the risks associated with data leaks and protect yourself from potential cyber threats.

Eclypsium and Panasonic Connect North America Partner to Protect Against Digital Infrastructure Threats Below the Surface With Smart Compliance

6 June 2024 at 08:50

Portland, OR – June 6, 2024 – Eclypsium®, the supply chain security company protecting critical hardware, firmware, and software, today announced its collaboration with Panasonic Connect North America in the release of Smart Compliance powered by Eclypsium. Smart Compliance is the latest offering from Panasonic Connect as a part of the TOUGHBOOK solution suite. The […]

The post Eclypsium and Panasonic Connect North America Partner to Protect Against Digital Infrastructure Threats Below the Surface With Smart Compliance appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.

The post Eclypsium and Panasonic Connect North America Partner to Protect Against Digital Infrastructure Threats Below the Surface With Smart Compliance appeared first on Security Boulevard.

Industry Leaders at World CyberCon Share Insights on Cyber Risk Management

META Cybersecurity

The grandeur of Al Habtoor Palace in Dubai set the stage for one of the most significant cybersecurity events in the Middle East: the World CyberCon 3.0 META Cybersecurity conference. This prestigious event brought together leading cybersecurity professionals and industry experts from around the world to discuss pressing issues and emerging trends in the field. Among the various World CyberCon META Edtion sessions, a panel discussion on cyber risk scoring drew substantial attention, underling its critical importance in today's digital landscape. During the session, Waqas Haider, the CISO of HBL Microfinance Bank, served as the moderator and steered the conversation among the panelists that featured Beenu Arora, Co-founder and CEO of Cyble; Azhar Zahiruddin, Director of Data Protection and Group DPO at Chalhoub Group; Ankit Satsangi, Director at Beeah Group; and Suhaila Hareb, ISR Auditor at Dubai Electronic Security Center.

Understanding Cyber Risk Scoring at World CyberCon META Cybersecurity Conference

Beenu Arora, the CEO of Cyble, delivered a global perspective that resonated profoundly with the audience. He highlighted the staggering statistics regarding data breaches over the past few years. According to statistics, over the past thousand days, more than 50,000 companies worldwide have fallen victim to data breaches. “In the last two and a half years, let’s say, the last thousand days. Can anybody guess how many companies have reportedly been breached? The number we have exactly at the moment is 50 thousand! So 50 thousand companies, globally, have been breached, in the last thousand days”, said Beenu Arora at The Cyber Express META Cybersecurity Conference in Dubai. Azhar Zahiruddin emphasized the importance of understanding the evolving nature of cyber threats and the necessity of robust data protection frameworks. He stressed that organizations must stay ahead of threat actors by continuously updating their security measures and protocols. Suhaila Hareb provided insights into the regulatory landscape and the role of compliance in enhancing cybersecurity defenses. She highlighted the significance of adhering to international standards and the need for regular audits to ensure that security measures are effective and up-to-date. Ankit Satsangi discussed practical strategies for improving cyber risk scoring mechanisms. He recommended a multi-layered approach to cybersecurity that integrates advanced technologies, employee training, and proactive threat intelligence. The panelists collectively underline the importance of cyber risk scoring as a tool for organizations to assess and manage their cybersecurity risks. Effective risk scoring enables companies to identify vulnerabilities, prioritize their security investments, and respond more swiftly to potential threats. Moreover, throughout the discussion, a common theme emerged: the need for better defense mechanisms to fight against online threats. The experts agreed that while technological advancements are crucial, human factors such as employee awareness and training play an equally vital role in maintaining enhanced cybersecurity. [caption id="attachment_71349" align="aligncenter" width="2800"]World CyberCon META (L-R: Suhaila Hareb - ISR Auditor, Dubai Electronic Security Center; Ankit Satsangi - Director, Beeah Group; Waqas Haider - CISO, HBL Microfinance Bank (Moderator), Azhar Zahiruddin - Director of Data Protection - Group DPO, Chalhoub Group and Beenu Arora - Co-founder and CEO, Cyble)[/caption]

A Call for Enhanced Defense Mechanisms

The World CyberCon 3.0 META Cybersecurity conference showcased the latest advancements and strategic insights in the field of cybersecurity. The panel on cyber risk scoring highlighted the critical role of this practice in helping organizations navigate the complex threat landscape. As cyber threats continue to evolve, the insights shared by these industry leaders provide valuable guidance for organizations seeking to bolster their cybersecurity defenses. By adopting comprehensive risk scoring mechanisms and staying informed about emerging threats, businesses can better protect their digital assets and maintain resilience in an increasingly interconnected world. Apart from this, the META edition of World CyberCon holded several interesting sessions on cybersecurity in the Middle East. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Women Take Center Stage at World CyberCon: Panel Explores AI for Threat Detection

World CyberCon META Edition

The 2024 World CyberCon META Edition, a resounding success held at Al Habtoor Palace in Dubai, featured a prominent all-women panel discussion titled "Strategic Investments in Cybersecurity: Leveraging AI and ML for Enhanced Threat Detection." The panel, moderated by Jo Mikleus, Senior Vice President of Cyble Inc., featured contributions from an array of distinguished experts including Sithembile (Nkosi) Songo, Chief Information Security Officer at ESKOM; Dina Alsalamen, VP and Head of Cyber and Information Security at Bank ABC; Afra Mohammed Almansoori, Business Analyst at Digital Dubai; and Irene Corpuz, Co-Founder of Women in Cyber Security Middle East. The session commenced with exploring how AI and machine learning (ML) are revolutionizing threat detection and response in cybersecurity. Afra Mohammed Almansoori highlighted the transformative impact of these technologies: "AI isn't just a substitute; it's a game-changer for cybersecurity. By harnessing AI and machine learning, we enhance threat detection capabilities, allowing us to focus on strategic security initiatives.

World CyberCon META Edition: Transforming Threat Detection and Response

AI and ML are redefining the landscape of cybersecurity through various applications. Behavioral analytics, anomaly detection, and automated incident response are now integral to modern cybersecurity strategies. AI's ability to analyze vast datasets and identify patterns that elude traditional methods enables organizations to preemptively address potential threats. Irene Corpuz reinforced this notion, stating, "AI isn't a replacement, it's a force multiplier for cybersecurity. Leveraging AI and machine learning strengthens our defenses by automating threat detection, freeing us to focus on strategic security initiatives." [caption id="attachment_71219" align="aligncenter" width="1024"]World CyberCon META Edition (L-R: Sithembile (Nkosi) Songo – Chief Information Security Officer, ESKOM; Afra Mohammed Almansoori – Business Analyst, Digital Dubai; Dina Alsalamen, VP, Head of Cyber and Information Security Department, Bank ABC; Irene Corpuz – Co-Founder, Women in Cyber Security Middle East and Jo Mikleus – Senior Vice President, Cyble Inc.)[/caption]

Enhanced Accuracy and Speed

The panel discussed notable use cases where AI and ML have significantly enhanced the accuracy and speed of threat detection. In one instance, Bank ABC utilized AI-driven analytics to thwart a sophisticated phishing attack that traditional security measures failed to detect. By rapidly identifying and responding to anomalies, AI systems have proven to be a vital asset in the fight against cybercrime. However, the integration of AI and ML into cybersecurity is not without challenges. The panel emphasized the importance of adopting applicable policies and standards to mitigate risks associated with these technologies. Regulatory frameworks must evolve to address issues such as data privacy, ethical use of AI, and the potential for AI-generated threats.

Integration with Existing Infrastructure

Integrating AI and ML capabilities with existing security infrastructure is another critical consideration. Organizations must ensure seamless integration to maximize the benefits of AI without disrupting their current operations. This involves upgrading legacy systems, training staff on new technologies, and continually assessing the performance of AI tools. Best practices in reorienting strategic investments were also discussed. Companies are increasingly allocating resources towards AI capabilities to stay ahead of emerging threats. By investing in AI and ML, businesses can enhance their threat detection and response mechanisms, thereby safeguarding their digital assets more effectively.

Overcoming Implementation Challenges

The panel acknowledged the challenges and limitations of implementing AI and ML in cybersecurity, especially for small and medium-sized enterprises (SMEs). Resource constraints, lack of expertise, and integration issues are common hurdles. To overcome these challenges, organizations should consider collaborative approaches, such as partnering with cybersecurity firms and leveraging cloud-based AI solutions. A key theme was the envisioned collaboration between humans and machines in cybersecurity operations. AI and ML technologies can augment the capabilities of human analysts by handling routine activities, thus allowing experts to focus on more strategic tasks. This symbiotic relationship enhances overall security posture and operational efficiency. The reception from key stakeholders, including Boards, CEOs, and CFOs, was noted as increasingly positive. As cyber threats become more sophisticated, there is growing recognition of the need for enhanced cybersecurity measures. Business leaders are supporting CISOs in making the necessary investments to protect their organizations.

Delivering ROI

Finally, the panel discussed how to position business cases for AI in cybersecurity to deliver ROI. Demonstrating the tangible benefits of AI investments, such as reduced incident response times and minimized breach impact, is crucial for securing buy-in from stakeholders. [caption id="attachment_71215" align="aligncenter" width="1024"]World CyberCon META Edition Jo Mikleus, Senior Vice President at Cyble Inc.[/caption] Jo Mikleus summed up the session by stating, "It was a privilege to moderate the World CyberCon panel, discussing AI as a critical strategic investment for cybersecurity and managing threat intelligence."

The Middle East's Cybersecurity Imperative

As digitalization surges across the Middle East, the importance of strong cybersecurity measures cannot be overstated. The region's rapid technological advancement necessitates a proactive approach to combat the escalating cyber threat landscape. Leveraging AI and ML to complement traditional cybersecurity defenses is advantageous, but proactive measures are essential to mitigate AI-related risks. Shadow AI in the workplace is growing, with an alarming 156% increase in employees inputting sensitive corporate data into chatbots like ChatGPT and Gemini. The World CyberCon Meta Edition 2024 underlines the critical role of AI and ML in modern cybersecurity strategies. As cyber threats continue to evolve, strategic investments in these technologies will be pivotal in safeguarding the digital future.

World CyberCon META Wraps Up, Highlighting Dubai’s Expanding Cybersecurity Prowess

World CyberCon Meta Edition

Dubai, UAE – May 24, 2024 – The Cyber Express proudly announces the successful conclusion of the third edition of the World CyberCon META Edition 2024. This landmark event, hosted at Al Habtoor Palace in the heart of Dubai, attracted over 100 attendees and featured more than six hours of intensive collaboration and networking. Participants from over 20 different industries demonstrated the extensive relevance and urgency of cybersecurity in today’s interconnected world.  The conference provided a crucial platform for addressing the escalating cybersecurity threats in the UAE, which is experiencing a significant digital transformation. According to Mordor Intelligence, the UAE Cybersecurity Market is projected to grow to approximately USD 950 million by 2028, highlighting the increasing demand for effective cybersecurity measures.  [caption id="attachment_70406" align="aligncenter" width="2800"]World CyberCon Meta Edition People Registering for World CyberCon Meta Edition[/caption] A standout moment of the conference was the keynote address by Irene Corpuz, a distinguished cybersecurity expert and co-founder of Women in Cyber Security Middle East. Corpuz delivered a compelling speech highlighting the increasing risks that cyberattacks pose to startup organizations, stressing that even small startups are prime targets for cybercriminals. 

World CyberCon META Edition: Diverse Sessions and Expert Panels 

This year’s World CyberCon showcased a diverse array of insightful sessions and expert-led panels. Among the highlights was a compelling panel discussion led by Jo Mikleus, Senior Vice President at Cyble. The panel featured an esteemed all-women lineup of cyber experts, including Irene Corpuz, Sithembile Songo, Eng. Dina AlSalamen, and Afra Mohammed Almansoori. Together, they discussed the transformative impact of AI on cybersecurity, highlighting its crucial role in advancing threat management and security measures.  [caption id="attachment_70432" align="aligncenter" width="2800"]World CyberCon Meta Edition (L-R: Dina Alsalamen, VP, Head of Cyber and Information Security Department, Bank ABC; Irene Corpuz - Co-Founder, Women in Cyber Security Middle East; Sithembile (Nkosi) Songo - Chief Information Security Officer, ESKOM; Afra Mohammed Almansoori - Business Analyst, Digital Dubai and Jo Mikleus - Senior Vice President, Cyble Inc. (Moderator))[/caption] The experts delved into how AI and ML technologies are transforming threat detection and response capabilities in cybersecurity. They shared use cases of behavioral analytics, anomaly detection, and automated incident response, showcasing how these technologies are being utilized to enhance security frameworks. 

Celebrating Excellence: The META Cybersecurity Awards 

[caption id="attachment_70404" align="aligncenter" width="2800"]World CyberCon Meta Edition Award Presentation[/caption] The event also celebrated achievements within the cybersecurity community through its prestigious awards ceremony. Heartfelt congratulations go out to all awardees for their pioneering contributions to the field. The awards highlighted the excellence and innovation driving the cybersecurity sector forward. Special thanks to our speakers, attendees, and partners, including Cyble Inc. and Synax Technologies, for their integral roles in the conference’s success.  The presence and support of the Ministry of Interior (MoI) significantly enriched the discussions and outcomes of the event. We thank Mariam Alhammadi, MOI SOC Manager, and Saeed M. AlShebli, Deputy Director of Digital Security Department, for their invaluable contributions and insights.  Augustin Kurian, Editor-in-Chief at The Cyber Express, shared his appreciation, stating, “The support and engagement from the entire cybersecurity community have been truly remarkable. This year's conference was not only a resounding success in terms of knowledge sharing but also underscored Dubai's role as a prominent tech hub in the face of worldwide digital challenges. A heartfelt thank you to all our participants, and to Dubai for its exceptional hospitality.”  [caption id="attachment_70435" align="aligncenter" width="1867"]World CyberCon Meta Edition Augustin Kurian, Editor-in-Chief at The Cyber Express[/caption] World CyberCon META Edition has firmly established itself as a must-attend event in the cybersecurity calendar. The third edition of World CyberCon was a testament to the dynamic and collaborative spirit of the cybersecurity community. The conference provided a vital platform for sharing knowledge, addressing pressing challenges, and exploring innovative solutions. With its blend of expert insights, collaborative discussions, and recognition of excellence, World CyberCon continues to play a pivotal role in advancing cybersecurity resilience.  [caption id="attachment_70437" align="aligncenter" width="2800"]World CyberCon Networking during Hi-Tea[/caption]

Looking Ahead 

The Cyber Express is excited to continue fostering these essential discussions in future editions. The success of this year's World CyberCon META Edition sets a high benchmark for the upcoming editions, promising even more engaging content, expert insights, and collaborative opportunities. As the digital landscape continues to evolve, the importance of such gatherings cannot be overstated. They not only provide a space for addressing current challenges but also pave the way for future innovations and solutions in cybersecurity.  For more information about World CyberCon and upcoming events, please visit thecyberexpress.com. 

Heimdal to Showcase Widest Cybersecurity Tech Stack at Infosecurity Europe 2024 – Source: heimdalsecurity.com

heimdal-to-showcase-widest-cybersecurity-tech-stack-at-infosecurity-europe-2024-–-source:-heimdalsecurity.com

Source: heimdalsecurity.com – Author: Madalina Popovici LONDON, May 23, 2024 – Heimdal® is excited to announce its participation in Infosecurity Europe 2024, taking place from 3-4 June 2024 at ExCel London. Attendees are invited to visit Heimdal’s booth for an exclusive opportunity to engage with industry-leading cybersecurity experts, experience live demonstrations, and enjoy engaging presentations. […]

La entrada Heimdal to Showcase Widest Cybersecurity Tech Stack at Infosecurity Europe 2024 – Source: heimdalsecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Heimdal to Showcase Widest Cybersecurity Tech Stack at Infosecurity Europe 2024

23 May 2024 at 06:39

LONDON, May 23, 2024 – Heimdal® is excited to announce its participation in Infosecurity Europe 2024, taking place from 4-6 June 2024 at ExCel London. Attendees are invited to visit Heimdal’s booth for an exclusive opportunity to engage with industry-leading cybersecurity experts, experience live demonstrations, and enjoy engaging presentations. Event Highlights Personalized Experience and Meet […]

The post Heimdal to Showcase Widest Cybersecurity Tech Stack at Infosecurity Europe 2024 appeared first on Heimdal Security Blog.

Heimdal Welcomes Jesper Frederiksen as Its New Chief Executive Officer

8 May 2024 at 11:53

Official Press Release Copenhagen, Denmark – May 8th, 2024 — Heimdal®, a global leader in cybersecurity solutions, is excited to announce the appointment of Jesper Frederiksen as its new Chief Executive Officer. Bringing a wealth of experience from the SaaS and cloud security sectors, Frederiksen is renowned for his expertise in scaling IT technology organizations and enhancing […]

The post Heimdal Welcomes Jesper Frederiksen as Its New Chief Executive Officer appeared first on Heimdal Security Blog.

Heimdal Teams Up with DACTA to Strengthen Cybersecurity in the APAC Region

30 April 2024 at 06:42

We’re excited to announce our latest venture, a strategic partnership with DACTA that promises to strengthen cybersecurity defenses across the Asia-Pacific (APAC) region. This collaboration is a testament to Heimdal’s dedication to pushing the boundaries of cybersecurity and extending our innovative solutions to new markets, with DACTA’s unparalleled regional expertise leading the charge. The synergy […]

The post Heimdal Teams Up with DACTA to Strengthen Cybersecurity in the APAC Region appeared first on Heimdal Security Blog.

❌
❌