Source: www.proofpoint.com – Author: 1 In a special episode of Behind the Deal live from Thoma Bravo’s Annual Meeting in March 2024, Managing Partner Seth Boro...
Author: CISO2CISO Editor 2
Proofpoint’s Brian Reed on the Data Loss Landscape – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 Home » Videos » Proofpoint’s Brian Reed on the Data Loss Landscape April 22, 2024 Proofpoint recently launched their inaugural Data...
The art of information gathering. – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss “From Social Engineering to DMARC Abuse: TA427’s Art of Information...
New Attack on VPNs – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier New Attack on VPNs This attack has been feasible for over two decades: Researchers have devised an attack against nearly...
#RSAC: Two-Thirds of Organizations Failing to Address AI Risks, ISACA Finds – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Only a third of organizations are adequately addressing security, privacy and ethical risks with AI, despite surging use of these technologies...
RSAC: Decoding US Government Plans to Shift the Software Security Burden – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 US government plans to boost software security by design were analyzed during the RSA Conference 2024. During the event, Bob Lord,...
RSAC: Log4J Still Among Top Exploited Vulnerabilities, Cato Finds – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Three years after its discovery, the Log4J vulnerability (CVE-2021-44228) exploit remains one of the most attempted exploits observed by cloud security provider...
Ransomware Strikes Wichita, Services Disrupted – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The City of Wichita, Kansas, has confirmed it was hit by a ransomware attack over the weekend, prompting the shutdown of...
LockBit Leader aka LockBitSupp Identity Revealed – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The leader of the notorious LockBit ransomware gang has had their identity revealed after a law enforcement takedown of the group’s...
RSAC: Three Battle-Tested Tips for Surviving a Cyber-Attack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Experiencing a cyber-attack as a chief information security officer (CISO) or a cybersecurity leader in your organization can be daunting. Russell...
Report Shows AI Fraud, Deepfakes Are Top Challenges For Banks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Fraud cases and scams have been increasingly perceived as sophisticated, with 76% of banks making this claim. The data comes from...
BTC-e $9bn Crypto-Money Launderer Pleads Guilty – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A Russian national has pleaded guilty to his role in a major money laundering conspiracy tied to the infamous BTC-e cryptocurrency...
China Suspected After Major MoD Payroll Breach – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Sensitive personal and financial information belonging to UK military personnel has been compromised in a significant state-sponsored data breach, according to...
U.S. Charges Russian Man as Boss of LockBit Ransomware Group – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs The United States joined the United Kingdom and Australia today in sanctioning 31-year-old Russian national Dmitry Yuryevich Khoroshev as the alleged...
Does CISA’s KEV Catalog Speed Up Remediation? – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Source: Federico Caputo via Alamy Stock Photo RSA CONFERENCE 2023 – San Francisco – When the...
What’s the Future Path for CISOs? – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jeffrey Schwartz, Contributing Writer Source: Kjetil Kolbjørnsrud via Alamy Stock Photo Security professionals who rise through the corporate ranks and become chief...
City of Wichita Public Services Disrupted After Ransomware Attack – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Source: Freedomz via Shutterstock The City of Wichita is investigating a ransomware attack that happened over the weekend...
Feds: Reducing AI Risks Requires Visibility & Better Planning – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Source: Deemerwha studio via Shutterstock When the US Department of Energy (DoE) analyzed the use of artificial intelligence...
Spies Among Us: Insider Threats in Open Source Environments – Source: www.darkreading.com
Source: www.darkreading.com – Author: Chris Lindsey Chris Lindsey, Application Security Evangelist, Mend.io May 7, 2024 3 Min Read Source: Brian Jackson via Alamy Stock Photo COMMENTARY...
Blinken: Digital Solidarity Is ‘North Star’ for US Policy – Source: www.darkreading.com
Source: www.darkreading.com – Author: Karen Spiegelman, Features Editor US Secretary of State Antony J. Blinken announced a new federal initiative to set up guardrails for digital...
Anetac Targets Service Account Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff 2 Min Read Source: Nico El Nino via Adobe Stock Photo Nearly every organization struggles to monitor service accounts,...
Exploits and vulnerabilities in Q1 2024 – Source: securelist.com
Source: securelist.com – Author: Alexander Kolesnikov, Vitaly Morgunov We at Kaspersky continuously monitor the evolving cyberthreat landscape to ensure we respond promptly to emerging threats, equipping...
Eclypsium Supply Chain Security Platform Protects GenAI Infrastructure with Addition of Hardware and Training Model Assessment Capabilities – Source: securityboulevard.com
Source: securityboulevard.com – Author: Chris Garland Eclypsium is extending its digital supply chain security to cover GenAI hardware and training models SAN FRANCISCO – RSA Conference...
Securing Supply Chains for GenAI Hardware and Models – Source: securityboulevard.com
Source: securityboulevard.com – Author: Chris Garland Today, at RSA Conference 2024, we’re announcing new capabilities to help secure the fundamental layers of the GenAI tech stack....
Enabling GenAI with AI-infused API Security – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Callahan GenAI has the promise to transform companies, and introduce a lot of security risk. One of the main benefits of...
API Vulnerabilities Found Across AI Infrastructure Projects at NVIDIA, Mercedes – Source: securityboulevard.com
Source: securityboulevard.com – Author: Nathan Eddy Organizations are rushing to integrate AI-driven features into their operations. However, the reliance on application programming interfaces (APIs) poses significant...
Datacenter Proxies: Unveiling the Workhorse of the Proxy World – Source: securityboulevard.com
Source: securityboulevard.com – Author: Ahona Rudra Reading Time: 4 min Proxies have become a cornerstone of online privacy and multifunctionality. Datacenter proxies, in particular, have established...
White House Cybersecurity Workforce Initiative Backed by Tech Titans – Source: securityboulevard.com
Source: securityboulevard.com – Author: Nathan Eddy With more than half a million cybersecurity positions currently open across the country, there is a pressing need to encourage...
Tracking Illegal Pharmaceutical Sales on Social Media – Source: securityboulevard.com
Source: securityboulevard.com – Author: Nisos Nisos Tracking Illegal Pharmaceutical Sales on Social Media Nisos continuously monitors mainstream and alternative social media platforms as well as other...
What are Cyber Essentials? Requirements, Preparation Process & Certification – Source: securityboulevard.com
Source: securityboulevard.com – Author: Ronan Grobler, Compliance Success Manager, Scytale Let’s be honest: anything with the word ‘essentials’ in it is bound to grab our attention....





























