article thumbnail

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Krebs on Security

Nikita Kislitsin , formerly the head of network security for one of Russia’s top cybersecurity firms, was arrested last week in Kazakhstan in response to 10-year-old hacking charges from the U.S. Department of Justice. “The company is monitoring developments.”

article thumbnail

Five James Bond gadgets which use real world technologies

CyberSecurity Insiders

To celebrate the recent release of the latest film No Time to Die , here’s our top five gadgets from the quintessential spy series, and how they relate to technologies we see in everyday life. Microchip implant – Casino Royale (2006). Palm print-enabled Walther PPK – Skyfall (2012). While most cars we drive today (hopefully!)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Achieving funding is no simple task, and cybersecurity entrepreneurs have a difficult path competing in a complex and competitive landscape. Luckily for cybersecurity startups, there’s no shortage of interest in tomorrow’s next big security vendors. Investments in cybersecurity more than doubled from $12 billion to $29.5

article thumbnail

Five Cybersecurity Trends that Will Affect Organizations in 2023

CyberSecurity Insiders

Netwrix, a cybersecurity vendor that makes data security easy, today released key IT security trends that will affect organizations of all sizes in 2023. Demand for cybersecurity professionals is far outpacing supply. This shortage of cybersecurity talent will increase risks for businesses as attacks become even more sophisticated.

article thumbnail

Lawmakers Should Update The Anti-Money-Laundering Act Of 2020 To Account For Inflation

Joseph Steinberg

While technological improvements over the past 51 years have obviously improved law enforcement’s capabilities vis-à-vis identifying problematic transactions, overreporting as a result of unnecessarily low thresholds can sometimes also hamper money-laundering detection by “creating much larger haystacks in which needles must be found.”

article thumbnail

Episode 222: US Rep. Himes on Congress’s About-face on Cybersecurity

The Security Ledger

In this week’s podcast, we speak with Congressman Jim Himes (D-CT) about Congress’s sudden focus on cybersecurity - an about face that Rep. Himes on Congress’s About-face on Cybersecurity appeared first on The Security Ledger with Paul F. The 2015 Cybersecurity Information Sharing Act is one great example. Jim Himes (D-CT).

article thumbnail

As Manufacturers Modernize Operational Technology, Closing Security Holes is a Growing Priority

CyberSecurity Insiders

The 2021 ISG Provider Lens Manufacturing Industry Services – Global report finds the complex mix of legacy OT and newer, connected technologies such as industrial IoT and machine learning has forced manufacturers to add security extensions for protection against cyberattacks. Founded in 2006, and based in Stamford, Conn.,