The Most Dangerous Evolution of Ransomware?

The year 2021 was filled with high-profile ransomware attacks on companies across industries – some of which (for example, the colonial pipeline attack) shut down entire markets and caused panic in parts of the United States. As devastating and devastating as these attacks were, the next wave of ransomware could be even more dangerous – … Read more

5 Cyber Resilience Lessons We Re-Learned in 2021 (But Will Probably Forget)

With each year come extraordinary new technological innovations. Some of the most creative ones, unfortunately, come from the minds of online attackers. Others help IT teams solve some old problems, but create new ones. But after every year, good basics never lose style. 2021 was no different. Here’s a look at some of the most … Read more

What is Customer Identity and Access Management (CIAM)?

Enabling secure online interactions is becoming critical, while authenticating users quickly and smoothly has become extremely challenging. Identity management has always been difficult, but it is getting more and more complex with each new account, cloud application, and device. Consumers are tired of passwords. However, customers and regulators alike are paying more attention to security … Read more

Why Modern Cybersecurity Requires AI

Cybersecurity was important even before the era of the mobile Internet when viruses spread through infected floppy disks. The battle between opponents and IT professionals is constantly escalating. Adversaries create new and different types of malware or attacks, and IT teams deploy new or improved types of defenses to protect growing data stocks. In the … Read more

December 2021 Global Tech Policy Briefing

Happy holidays and welcome back to Citizen Tech, InformationWeek’s monthly policy report. For this 2021 Final Report, we look at the Biden administration’s triumphs, failures, and promises, as well as cybersecurity in the United States and beyond, digital business conditions in Europe, and more. ‘Build Back Better’ hits the wall President Biden’s Rebuilding Better Infrastructure … Read more

The Cost of a Ransomware Attack, Part 1: The Ransom

By many estimates, ransomware attacks are among the most common, if not the most common, type of cyber attack. While the number of attacks is generally trending downward, the average cost of an attack is rising exponentially — in part because malicious actors are increasingly targeting companies with the resources to pay large ransoms (and … Read more

Leveraging AIOps in the Finance Industry

When was the last time you walked into a bank to withdraw cash? How often does your checkbook balance? These once-routine manual processes are now primarily digital, even prompting some financial giants to advertise themselves as tech companies. While many keep pace with consumers’ demands for digital services, few organizations are implementing advanced automated technologies … Read more

Log4J Attacks Confirm Need for DevSecOps, Automation, SBOM

Alarms set off from a barrage of cyberattacks that exploit critical vulnerabilities in Log4J – Apache’s Java-based logging tool. Federal government agencies have only two days left to initiate mitigation measures to comply with emergency directive issued by the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). But despite the interest, don’t … Read more