CNAPP buyers guide: Top tools comparedCloud security continues to be a vexing situation, and the tool set continues to become more complex, riddled with acronyms representing...
Day: September 22, 2022
One-third of enterprises don’t encrypt sensitive data in the cloud
One-third of enterprises don’t encrypt sensitive data in the cloudWhile most organizations list cloud security as one of their top IT priorities, they continue to ignore...
Q-Scout aims for smartphone security without the intrusiveness
Q-Scout aims for smartphone security without the intrusivenessMobile security firm Quokka—which earlier this week rebranded from its previous name, Kryptowire—is launching a new smartphone protection product...
Recommended security resources for Microsoft Active Directory
Recommended security resources for Microsoft Active DirectoryMany firms are still firmly in an Active Directory (AD) world. They may have moved some applications to the cloud,...
Iranian cyberspies use multi-persona impersonation in phishing threads
Iranian cyberspies use multi-persona impersonation in phishing threadsOne of the most prolific state-sponsored Iranian cyber espionage groups is targeting researchers from different fields by setting up...
One in 10 employees leaks sensitive company data every 6 months: report
One in 10 employees leaks sensitive company data every 6 months: reportInsider threats are an ongoing menace that enterprise security teams need to handle. It's a...
New Sysdig cloud security software prioritizes risk, cuts remediation time
New Sysdig cloud security software prioritizes risk, cuts remediation timeUnified container and cloud security firm Sysdig on Wednesday launched its cloud security posture management (CSPM) offering,...
AutoRabit launches devsecops tool for Salesforce environments
AutoRabit launches devsecops tool for Salesforce environmentsDevsecops firm AutoRabit is trying to address security issues arising from policy changes and misconfigurations in Salesforce environments with a...
Cybersecurity startup launches mobile app to protect against phishing attacks
Cybersecurity startup launches mobile app to protect against phishing attacksCybersecurity startup novoShield has launched an enterprise-grade mobile security application, designed to protect users from mobile phishing...
Excess privilege in the cloud is a universal security problem, IBM says
Excess privilege in the cloud is a universal security problem, IBM saysExcess privilege granted to cloud identities is a key component in 99% of all security...
Russia’s cyber future connected at the waist to Soviet military industrial complex
Russia’s cyber future connected at the waist to Soviet military industrial complexThe Center for European Policy Analysis (CEPA) recently published a 38-page study, Russian Cyberwarfare: Unpacking...
U.S. government issues guidance for developers to secure the software supply chain: Key takeaways
U.S. government issues guidance for developers to secure the software supply chain: Key takeawaysSoftware supply chain attacks are on the rise, as cited in the Cloud...
Most enterprises looking to consolidate security vendors
Most enterprises looking to consolidate security vendorsA total 75% of organizations across North America, Asia Pacific and EMEA plan to consolidate the number of security vendors...
US government indicts Iranian nationals for ransomware and other cybercrimes
US government indicts Iranian nationals for ransomware and other cybercrimesThe US Department of Justice (DOJ) unsealed an indictment that charged three Iranian cybercriminals with orchestrating a...
Control Structured Data with Intelligent Archiving
Control Structured Data with Intelligent ArchivingIt’s no surprise that nearly every business today faces exponential data growth, with huge volumes of information in diverse formats spread...
Deliver Secure Digital Workspaces with Citrix Virtual Apps and Desktops on Microsoft Azure
Deliver Secure Digital Workspaces with Citrix Virtual Apps and Desktops on Microsoft AzureWhere, when, and how people work has dramatically changed. Remote work trends are here...
Morgan Stanley’s Hard Drive Destruction Investment Failure
Morgan Stanley's Hard Drive Destruction Investment Failure$35 Million Fine From Securities and Exchange Commission Covers 5 Years of MishapsFinancial services giant Morgan Stanley will pay a...
Become an ethical hacker online
Become an ethical hacker onlineGet nine bundled courses on white hat hacking for just $34. The post Become an ethical hacker online appeared first on TechRepublic....
Uber responding to “cybersecurity incident” following reports of significant data breach
Uber responding to “cybersecurity incident” following reports of significant data breachRide-hailing giant Uber has confirmed that it is responding to a cybersecurity incident as reports emerge...
Sophisticated Hermit Mobile Spyware Heralds Wave of Government Surveillance
Sophisticated Hermit Mobile Spyware Heralds Wave of Government SurveillanceAt the SecTor 2022 conference in Toronto next month, researchers from Lookout will take a deep dive into...
Medtronic Recalls Certain Insulin Pumps Due to Cyber Flaw
Medtronic Recalls Certain Insulin Pumps Due to Cyber FlawFeds Also Warn the Issue Could Affect the Dose of Insulin Delivered to a PatientFederal authorities have issued...
Wintermute CEO Renews Plea for Hacker to Return Stolen Funds
Wintermute CEO Renews Plea for Hacker to Return Stolen FundsHack Traced to Bug in Wallet Addressing ToolWhoever stole $160 million from Wintermute, the cryptocurrency trading firm's...
Threat Actor Abuses LinkedIn’s Smart Links Feature to Harvest Credit Cards
Threat Actor Abuses LinkedIn's Smart Links Feature to Harvest Credit CardsThe tactic is just one in a constantly expanding bag of tricks that attackers are using...
Malwarebytes blocks Google, YouTube as malware
Malwarebytes blocks Google, YouTube as malwareSounds like fair comment Updated Google and its Youtube domains are being flagged as malicious by Malwarebytes as of Wednesday morning,...
Uber investigating security breach of several internal systems
Uber investigating security breach of several internal systemsCommunications and engineering systems were taken offline after hacker sends images of repositories to cybersecurity researchers and The New...
API security—and even visibility—isn’t getting handled by enterprises
API security—and even visibility—isn’t getting handled by enterprisesA report released this week by OpinionMatters and commissioned by Noname Security found that more than three out of...
Public Water Systems at Cybersecurity Risk, Lawmakers Hear
Public Water Systems at Cybersecurity Risk, Lawmakers HearMunicipal Water Systems Installing Networked Control SystemsPublic water systems in the United States will continue connecting control systems to...
Quantify Risk, Calculate ROI
Quantify Risk, Calculate ROISecurityScorecard's ROI Calculator helps organizations quantify cyber-risk to understand the financial impact of a cyberattack.Leer másDark ReadingSecurityScorecard's ROI Calculator helps organizations quantify cyber-risk...
Get a lifetime of VPN protection for just $60
Get a lifetime of VPN protection for just $60Grab a special deal on the secure Ivacy virtual private network and NAT firewall today. The post Get...
Universities Urged to Defend Sensitive Research from Hackers
Universities Urged to Defend Sensitive Research from HackersAdversaries Want to Interfere With Research at US Schools. How Can They be Stopped?Cyberattacks against universities have forced academia...