Modern CISOs: 4 Habits Of Highly Effective Leaders
What makes the modern CISO effective? Here are 4 keys to leadership for today’s increasingly complex security landscape.
What makes the modern CISO effective? Here are 4 keys to leadership for today’s increasingly complex security landscape.
Oftentimes, cyber attackers are able to infiltrate the networks of organizations through holes in older programs which have not been updated. Recently, a malware known as “DoublePulsar” has been found targeting un-patched Windows systems, inserting itself within networks and laying seeds for future ransomware attacks. Here’s what’s currently known about this threat and what steps you can take to prevent yourself from falling victim to it. An Advanced Attacker As reported in Bank Info Security, a group of hackers known as the “Shadow Brokers” – believed to have ties with the Russian government – released a set of attack tools which exploit flaws in older versions of Windows. One of these tools, DoublePulsar, has been adopted by attackers and implanted in
We’re here to discuss your upcoming IT security assessment and compliance audit needs.