Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Experts On Google Voice Outage
Preparing For Tomorrow – Why Weathering The Initial...
The Cybersecurity Disconnect: Remote Working Highlights The Need...
Expert Reaction On GCHQ To Use AI In...
Comment: Hackers Break Into ‘Biochemical Systems’ At Oxford...
Expert Reaction On Private Data Leaked From Far-right...
LogMein And IDG Study Reveals Half Of Organisations...
For FIPS Sake – Smashing The iStorage DiskAshur...
Five Solutions To The Information Security Skills Crisis
Hackers Break Into ‘Biochemical Systems’ At Oxford Uni...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Yiannis Fragkoulopoulos
Customer Security & Professional Services Directorfeature_status*/ ?>
Obrela

Comments Dotted : 1
February 19, 2021

Cybersecurity Expert Commentary: Hacker Claims To Have Stolen Files Belonging To Law Firm Jones Day

A new culture is required by organisations to effectively manage this new reality.

Supply chain attacks are an emerging kind of threat increasingly used by cyber criminals. The SolarWinds hack is a very recent case demonstrating the sophistication and the impact that this type of attack may have. A new culture is required by organisations to effectively manage this new reality; they need to enforce for the entirety of their third parties a minimum level of cybersecurity controls (both organisational and technical) prior to giving them access to any of their information

.....Read More

Supply chain attacks are an emerging kind of threat increasingly used by cyber criminals. The SolarWinds hack is a very recent case demonstrating the sophistication and the impact that this type of attack may have. A new culture is required by organisations to effectively manage this new reality; they need to enforce for the entirety of their third parties a minimum level of cybersecurity controls (both organisational and technical) prior to giving them access to any of their information assets. Given the vast number of third parties an organization may digitally interact with, a standardised, automated and holistic cybersecurity evaluation process should be in place.

  Read Less
Like(0)  (0)

Linkedin Message

@Yiannis Fragkoulopoulos, Customer Security & Professional Services Director, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"A new culture is required by organisations to effectively manage this new reality...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cybersecurity-expert-commentary-hacker-claims-to-have-stolen-files-belonging-to-law-firm-jones-day

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Yiannis Fragkoulopoulos, Customer Security & Professional Services Director, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"A new culture is required by organisations to effectively manage this new reality...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/cybersecurity-expert-commentary-hacker-claims-to-have-stolen-files-belonging-to-law-firm-jones-day

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Chris Hickman, Chief Security Officer, Keyfactor

"A certificate expiration on its own is not necessarily a security response incident. "

Experts On Google Voice Outage

Adam Enterkin, SVP, EMEA, BlackBerry

"Even the best cybersecurity teams have had major challenges this last year. "

Expert Reaction On GCHQ To Use AI In Cyberwarfare

Jamie Akhtar, CEO and Co-founder, CyberSmart

"Universities are home to some of the world’s most cutting-edge research. "

Comment: Hackers Break Into ‘Biochemical Systems’ At Oxford Uni Lab Studying Covid-19

Jake Moore, Cybersecurity Specialist, ESET

"Honourable criminal hacking is still illegal and comes with some of the same intentions of standard unethical hacking. "

Expert Reaction On Private Data Leaked From Far-right Platform Gab

Dan Panesar, Director UK & Ireland, Securonix Inc.

"Even unsophisticated attacks can cripple digital engagement efforts. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

Sam Curry, Chief Security Officer, Cybereason

"Oxford's researchers have likely spent months working on, they will see a big payday. "

Hackers Break Into ‘Biochemical Systems’ At Oxford Uni Lab Studying Covid-19

Adam Palmer, Chief Cybersecurity Strategist , Tenable

"The attack against the Npower app is just the most recent example of cybercriminals. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

John Vestberg, President and CEO, Clavister

"In the new era of remote working, security needs to span on premise and the cloud. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

Martin Jartelius, CSO , Outpost24

"Password managers are helpful but two-factor authentication should ideally be something most sites offer today. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

James McQuiggan, Security Awareness Advocate, KnowBe4

"Organizations want to implement a robust security culture to inform users of the importance of unique passwords. "

NPower Shutsdown App After Hackers Steal Customer Bank Info

Brad Ree, CTO, ioXt Alliance

"The Clubhouse data breach has once again brought mobile app security vulnerabilities into the spotlight. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Saryu Nayyar, CEO, Gurucul

"Employee's email account being breached and the attacker failing in their scam. "

Sequoia Capital Discloses Data Breach – Expert Insights

Satnam Narang, Senior Research Engineer, Tenable

"There are confirmed reports that attackers are probing for vulnerable vCenter Server systems. "

VMware Advisory – Expert Comment

Niamh Muldoon, Senior Director of Trust and Security EMEA, OneLogin

"Always remember that your employees are your most valuable asset. "

Federal Reserve Nationwide Outage Impacts US Banking System

Steve Forbes, Government Cyber Security Expert, Nominet States

"CNI, government and the cyber industry should collaborate with a clear focus on large scale interventions. "

Expert Reaction On New CNI UK Cyber Report

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel