Name That Toon: Join the ClubFeeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.Read MoreDark...
Day: February 23, 2023
Cyberthreats, Regulations Mount for Financial Industry
Cyberthreats, Regulations Mount for Financial IndustryNation-state adversaries, new reporting regulations, and a fast-paced threat landscape mean that financial services and technology firms need to bolster their...
Analysts Slam Twitter’s Decision to Disable SMS-Based 2FA
Analysts Slam Twitter's Decision to Disable SMS-Based 2FAMaking the option available only to paid subscribers — while also claiming SMS authentication is broken — doesn't make...
Malwarebytes Expands Platform With New Application Block Capabilities
Malwarebytes Expands Platform With New Application Block CapabilitiesLatest threat prevention module helps resource-strapped security teams block unsafe, untrusted or vulnerable applications.Read MoreDark ReadingLatest threat prevention module...
CREST Calls for Greater Equity, Inclusion and Diversity As Part of National Cyber Security Strategy
CREST Calls for Greater Equity, Inclusion and Diversity As Part of National Cyber Security StrategyPost ContentRead MoreDark Reading
Black Hat to Launch Official Certification Program
Black Hat to Launch Official Certification ProgramPost ContentRead MoreDark Reading
Scrut Automation Raises Funding of $7.5M, Led by MassMutual Ventures, Lightspeed, and Endiya Partners
Scrut Automation Raises Funding of $7.5M, Led by MassMutual Ventures, Lightspeed, and Endiya PartnersWith the fresh capital, Scrut aims to focus on simplifying risk management and...
How to Stop Attackers That Target Healthcare Imaging Data
How to Stop Attackers That Target Healthcare Imaging DataAttribute-based encryption could help keep sensitive metadata off of the Dark Web.Read MoreDark ReadingAttribute-based encryption could help keep...
4 Tips to Guard Against DDoS Attacks
4 Tips to Guard Against DDoS AttacksAttackers are now using multiple types of distributed denial-of-service (DDoS) attacks to take down sites. Here are some ways to...
7 Tips for Mitigating Cyber-Risks to Your Corporate Social Media
7 Tips for Mitigating Cyber-Risks to Your Corporate Social MediaHow to stay safe, even when tech-savvy admins can't tell the difference between a scam and the...
Exploit Code Released for Critical Fortinet RCE Bug
Exploit Code Released for Critical Fortinet RCE BugOrganizations are urged to update to the latest versions of FortiNAC to patch a flaw that allows unauthenticated attackers...
Trend Micro Acquires SOC Technology Expert Anlyz
Trend Micro Acquires SOC Technology Expert AnlyzTechnology tuck-in enhances industry's broadest XDR security platform.Read MoreDark ReadingTechnology tuck-in enhances industry's broadest XDR security platform.
This Will Be the Year of the SBOM, for Better or for Worse
This Will Be the Year of the SBOM, for Better or for WorseSharing attestations on software supply chain data that are formed into a policy will...
Top Takeaways From CloudNativeSecurityCon 2023
Top Takeaways From CloudNativeSecurityCon 2023CloudNativeSecurityCon North America 2023 was a vendor-neutral cloud-native security conference. Here's why it was important.Read MoreDark ReadingCloudNativeSecurityCon North America 2023 was a...
(ISC)² Opens Security Congress 2023 Call for Presentations
(ISC)² Opens Security Congress 2023 Call for Presentations(ISC)2 members and cybersecurity professionals worldwide are encouraged to share their expertise, best practices and experiences with their peers...
Rezilion Research Discovers Hidden Vulnerabilities in Hundreds of Docker Container Images
Rezilion Research Discovers Hidden Vulnerabilities in Hundreds of Docker Container ImagesPost ContentRead MoreDark Reading
Why Are My Employees Integrating With So Many Unsanctioned SaaS Apps?
Why Are My Employees Integrating With So Many Unsanctioned SaaS Apps?Before adopting SaaS apps, companies should set security guardrails to vet new vendors and check security...
LIVE Webinar | Cisco Duo and Umbrella are better together!
LIVE Webinar | Cisco Duo and Umbrella are better together!Post ContentRead MoreDataBreachToday.com RSS Syndication
Nuevo S1deload Malware secuestrando cuentas de redes sociales de usuarios
Nuevo S1deload Malware secuestrando cuentas de redes sociales de usuariosUna campaña activa de malware ha puesto su mira en los usuarios de Facebook y YouTube aprovechando...
Google Confirms Increase In Russian Cyber Attacks Against Ukraine
Google Confirms Increase In Russian Cyber Attacks Against UkraineAccording to a new report released by Google’s Threat Analysis Group (TAG) and Mandiant, Russia’s cyber attacks against...
Top 100 CISOs
Top 100 CISOs These CISOs competed against thousands of candidates for this prestigious award. Judges look at these candidates, searching for the most innovative, with unparalleled...
Top 100 Women in Cybersecurity
Top 100 Women in CybersecurityAbbott Ekta Sirwani https://www.linkedin.com/in/ekta-sirwani/ Absolute Christy Wyatt https://www.linkedin.com/in/christywyatt/ Alert Logic Sydna Kelley https://www.linkedin.com/in/sydnakelley/ Alta Associates Joyce Brocaglia https://www.linkedin.com/in/joycebrocaglia/ AppEsteem Corporation Hong Jai...
Cyber Defense Magazine– PQC & Biometrics
Cyber Defense Magazine– PQC & BiometricsWhy biometric security is crucial in a post-quantum world By Nils Gerhardt, Chief Technology Officer for Utimaco Many are saying that...
Virtual Security and why it matters so much to SMEs
Virtual Security and why it matters so much to SMEsBy Jack Viljoen, Head of Marketing, Prodinity In recent years, there has been an exponential rise in...
Why “Point-In-Time” Solutions Are Losing The Battle Against Sophisticated Fraud
Why “Point-In-Time” Solutions Are Losing The Battle Against Sophisticated FraudBy Alisdair Faulkner, CEO at Darwinium Cybersecurity and fraud teams have been locked in a technology arms...
Organizations Have Security Priorities Mismatched as Breaches Continue to Rise
Organizations Have Security Priorities Mismatched as Breaches Continue to RiseBy Tyler Farrar, CISO, Exabeam According to the Exabeam State of the SIEM survey, security professionals remain...
Why Finding The Right Load Balancing Solution Is Crucial For Hybrid Cloud
Why Finding The Right Load Balancing Solution Is Crucial For Hybrid CloudBy Jason Dover, VP of Product Strategy at Progress In today’s competitive landscape, every business...
Why Low-Code AI Is Needed Now More Than Ever
Why Low-Code AI Is Needed Now More Than EverBy Solomon Ray, Director of Innovation, Strategy, and Special Projects at Iterate.ai As a business leader and executive,...
SMB Cyber Insurance: The End of Innocence
SMB Cyber Insurance: The End of InnocenceBy Nadav Arbel, Co-founder & CEO, CYREBRO The cyber insurance landscape has changed dramatically in recent years – for both...
Why Power Matters in Cyber Protection
Why Power Matters in Cyber ProtectionDefending power management equipment in an era of more connectivity By James Martin, Global Connectivity Product Manager, Eaton It’s well understood...