Systemic Risk Threatens Every OrganizationContenido de la entradaLeer másProofpoint News Feed
Month: December 2022
Perspectives from the field: Optimizing your cloud security
Perspectives from the field: Optimizing your cloud securityKonstantina Koukou is a well-rounded, tech-savvy electrical engineering graduate with a specialization in Information and Telecommunication Systems and has...
Artificial intelligence driving high-performance cloud security transformations
Artificial intelligence driving high-performance cloud security transformationsEXECUTIVE SUMMARY: Migrating to the cloud can afford organizations a broad range of new opportunities and can confer numerous business...
Is cloud native security good enough?
Is cloud native security good enough?By Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies. Global organizations are digitally transforming via cloud native applications and services....
San Francisco terminates explosive killer cop bots
San Francisco terminates explosive killer cop botsI'll be back, or perhaps not San Francisco legislators this week changed course on their killer robot policy, banning the...
Proofpoint Signs Definitive Agreement to Acquire Illusive
Proofpoint Signs Definitive Agreement to Acquire IllusiveContenido de la entradaLeer másProofpoint News Feed
Egad, did Apple do something right? End-to-end encryption for (most) iCloud services
Egad, did Apple do something right? End-to-end encryption for (most) iCloud servicesAnd remember CSAM scanning plan? Forget that was ever a thing Apple says it will...
States label TikTok ‘a malicious and menacing threat’
States label TikTok 'a malicious and menacing threat'Texas bucks app off government devices as Indiana takes social media biz to court Two more US states have...
Weep for the cybercriminals who fell for online scams and lost $2.5m last year
Weep for the cybercriminals who fell for online scams and lost $2.5m last yearI'm the smartest guy in the room, I'm sure the message from IRS...
North Korea hits new low by using Seoul Halloween tragedy to exploit Internet Explorer zero-day
North Korea hits new low by using Seoul Halloween tragedy to exploit Internet Explorer zero-dayEvil, pure and simple North Korea has hit a new low, using...
Five British companies fined for making half a million nuisance calls
Five British companies fined for making half a million nuisance callsNice. They went after vulnerable people and folks over 60 who opted out of marketing calls...
REvil-hit Medibank to pull plug on IT, shore up defenses
REvil-hit Medibank to pull plug on IT, shore up defensesIf safety regulations are written in blood, what are security policies written in? Sweat and cursing? Australian...
North Korea using freelance techies to fund missiles and nukes
North Korea using freelance techies to fund missiles and nukesYou won't see 'Agent of vile murderous autocracy' on their CVs. Or their faces on vid chats...
Boss installed software from behind the Iron Curtain, techies ended up Putin things back together
Boss installed software from behind the Iron Curtain, techies ended up Putin things back togetherComrade offered 'monitoring' tool to keep an eye on the workers On...
UK lawmakers look to enforce blocking tools for legal but harmful content
UK lawmakers look to enforce blocking tools for legal but harmful contentThe latest idea in the long gestation of the online harms legislation The UK government...
Guess which Fortune 500 brands and govt agencies share data with Twitter?
Guess which Fortune 500 brands and govt agencies share data with Twitter?Spoiler alert: just about all of them, all across the planet More than 70,000 websites...
Italy, Japan, UK to jointly launch sixth-gen fighter jet by 2035
Italy, Japan, UK to jointly launch sixth-gen fighter jet by 2035Warplane project may include AI in the cockpit, and comes as tensions rise with China and...
Legit Android apps poisoned by sticky ‘Zombinder’ malware
Legit Android apps poisoned by sticky 'Zombinder' malwareSure, go ahead and load APKs instead of using an app store. You won't enjoy the results Threat researchers...
GUEST ESSAY: Here’s how and why ‘trust’ presents an existential threat to cybersecurity
GUEST ESSAY: Here’s how and why ‘trust’ presents an existential threat to cybersecurityOver the years, bad actors have started getting more creative with their methods of...
MY TAKE: The role of semiconductors in bringing the ‘Internet of Everything’ into full fruition
MY TAKE: The role of semiconductors in bringing the ‘Internet of Everything’ into full fruitionThe Internet of Everything (IoE) is on the near horizon. Related: Raising...
This ransomware gang is a right Royal pain in the AES for healthcare orgs
This ransomware gang is a right Royal pain in the AES for healthcare orgsNothing like your medical files being taken hostage for millions of dollars Newish...
K24359631: Intel BIOS firmware vulnerability CVE-2022-21198
K24359631: Intel BIOS firmware vulnerability CVE-2022-21198Intel BIOS firmware vulnerability CVE-2022-21198 Security Advisory Security Advisory Description Time-of-check time-of-use race condition in the BIOS firmware for some Intel(R)...
Japan, Australia to bolster cyber-defenses, maybe offensive capacity too
Japan, Australia to bolster cyber-defenses, maybe offensive capacity tooFTX Japan payment promise evaporates; VR/AR to boom across APAC; Google wins privacy case Asia In Brief Australia's...
IT security teams, business execs still not on same page
IT security teams, business execs still not on same pageAlso: Guri the air-gap guru strikes again, while pro-Ukraine hackers set up a proxy network in Russia...
UK arrests five for selling ‘dodgy’ point of sale software
UK arrests five for selling 'dodgy' point of sale softwareTurns a $100 bottle of wine into a $4 soft drink to avoid tax, earning probe by...
Apple announces new security and privacy measures amid surge in cyber-attacks
Apple announces new security and privacy measures amid surge in cyber-attacksEncryption of iCloud storage means the information will be safeguarded from hackers as well as government...
Previewing Black Hat Europe 2022 in London: 12 Hot Sessions
Previewing Black Hat Europe 2022 in London: 12 Hot SessionsCollective DDoS Defense, Rethinking Internet Defense, Zero-Day Harvesting and MoreBlack Hat Europe returns to London, offering deep...
A Plan to Address Future Healthcare Cyber Challenges
A Plan to Address Future Healthcare Cyber ChallengesThe Health Sector Coordinating Council is embarking on a five-year strategic plan to help the healthcare and public health...
Clare O’Neil warns counter-terror laws may need to change to better handle rightwing extremism
Clare O’Neil warns counter-terror laws may need to change to better handle rightwing extremismHome affairs minister says government preparing program to counter foreign interference and youth...
Ransomware Defense: Common Mistakes to Avoid
Ransomware Defense: Common Mistakes to AvoidThis week's edition of the ISMG Security Report discusses the mistakes enterprises commonly make when building ransomware defenses, the cybersecurity capabilities...