Remove 2010 Remove Accountability Remove Information Security Remove Risk
article thumbnail

SJW Group Appoints James P. Lynch as Chief Accounting Officer, Andrew Walters as Chief Financial Officer; San Jose Water Appoints Peter Fletcher as Vice President – Information Security Officer

CyberSecurity Insiders

Lynch as chief accounting officer and Andrew F. Peter Fletcher has been appointed vice president – information security officer of San Jose Water Co., Lynch, who had served as the CFO and treasurer since 2010, has taken on the role of CAO. Walters as chief financial officer. a wholly owned subsidiary of SJW Group.

article thumbnail

British Court rejects the US’s request to extradite Julian Assange

Security Affairs

Judge Vanessa Baraitser denied the extradition due to suicide risk for the impression he could suffer in the U.S. “Taking account of all of the information available to him, he considered Mr Assange’s risk of suicide to be very high should extradition become imminent.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MEET THE RECIPIENTS OF THE 2021 (ISC)² GOVERNMENT PROFESSIONAL AWARD

CyberSecurity Insiders

The (ISC)² Government Professional Award recognizes government cybersecurity leaders whose commitment to excellence has helped to improve government information security and advance an in-demand workforce. in Information Systems Management (2010), C.A.S. in Information Security Management (2010), and Ph.D.

article thumbnail

The Resurgence of Zero Trust: Why it’s Essential for CISOs and CIOs to Include in Their Strategy

CyberSecurity Insiders

History of Zero Trust Its widely accepted that the concept of zero trust was first introduced by John Kindervag, a former Forrester Research analyst, in 2010. While the idea of zero trust has been around for decades, it has gained renewed attention due to the evolving threat landscape and the increasing need for robust cybersecurity measures.

CISO 87
article thumbnail

SAP systems are targeted within 72 hours after updates are released

Security Affairs

Furthermore, attackers used proof-of-concept code to attack SAP systems, but also brute-force attacks to take over high-privileged SAP user accounts. The goal of these attacks was to take full control of an SAP deployment in order to modify configurations and user accounts to exfiltrate business information.

Risk 98
article thumbnail

Key aerospace player Safran Group leaks sensitive data

Security Affairs

The vulnerability left the company at risk from cyberattacks over an extended period of time. Knowing them, a threat actor could be able to hijack the session and therefore the account. If attackers had access to this key, they could create an admin account and have privileged access to a website.

article thumbnail

Hackers actively targeting unsecured SAP installs, DHS, SAP and Onapsis warn

SC Magazine

Multiple hackers are actively targeting SAP installations that have not updated in nearly a year or use poor account management. The warning, which came from the Department of Homeland Security, SAP and Onapsis, is based on research documenting activity in the wild. SAP warned users to change those account names in 2018.