Source: www.securityweek.com – Author: Eduard Kovacs French aerospace giant Airbus could acquire Atos’ cybersecurity unit for up to $2 billion, but discussions are at a preliminary...
4.5 Million Individuals Affected by Data Breach at HealthEC – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire HealthEC says personal information received from business partners was compromised in a July 2023 data breach. The post 4.5 Million...
Beyond Protocols: How Team Camaraderie Fortifies Security – Source: www.securityweek.com
Source: www.securityweek.com – Author: Joshua Goldfarb The most efficient and effective teams have healthy and constructive cultures that encourage team members to go above and beyond...
Estes Express Lines Says Personal Data Stolen in Ransomware Attack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Estes Express Lines is informing over 21,000 individuals that their personal information was stolen in a ransomware attack. The post...
Hacked Mandiant X Account Abused for Cryptocurrency Theft – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Mandiant’s account on X, formerly Twitter, was hacked and used to lure users to a cryptocurrency phishing site. The post...
RIPE Account Hacking Leads to Major Internet Outage at Orange Spain – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Orange Spain’s internet went down for several hours after its RIPE account was hacked, likely after malware stole the credentials....
Intel Spins Off Enterprise Generative AI Deployment Firm Articul8 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Megan Crouse Intel and the global investment firm DigitalBridge Group have formed an independent generative AI software stack company, Articul8 AI, Inc....
Event Codes for Fun and Profit
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
2023–2030 Australian Cyber Security Strategy
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
EU GDPR Case Book 2023
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Survey Surfaces Lack of Confidence in Existing Cybersecurity Tools – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Vizard A survey of 214 senior executives involved in cybersecurity decisions found more than half (53%) would replace their entire current...
SentinelOne Acquires PingSafe to Advance CNAPP Ambitions – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Vizard SentinelOne this week announced it is acquiring PingSafe to add a cloud-native application protection platform (CNAPP) to extend its cybersecurity...
USENIX Security ’23 – Sathvik Prasad, Trevor Dunlap, Alexander Ross, Bradley Reaves – ‘Diving into Robocall Content With SnorCall’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman No one specifically Someone on our general security team A dedicated person/team that handles cloud security Cloud architects and developers...
Netography Fusion Expands Microsoft Integrations for Greater Context Enrichment and Faster Compromise Detection – Source: securityboulevard.com
Source: securityboulevard.com – Author: Patrick Bedwell Netography Fusion Expands Microsoft Integrations for Greater Context Enrichment and Faster Compromise Detection By Patrick Bedwell We’ve got great news...
Your Guide to Building a Successful Attack Surface Management Strategy – Source: securityboulevard.com
Source: securityboulevard.com – Author: Cavelo Blog At its core, Attack Surface Management (ASM) is the process of identifying and managing the various points where your organization...
Randall Munroe’s XKCD ‘2024’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman No one specifically Someone on our general security team A dedicated person/team that handles cloud security Cloud architects and developers...
Structuring the Unstructured: Consolidating Reports into One Cohesive Record – Source: securityboulevard.com
Source: securityboulevard.com – Author: Harris Maidenbaum Article Discover how combining your investigative research into a configurable, cohesive report can help surface more from your findings. By:...
EDR – More Than An Acronym – Source: securityboulevard.com
Source: securityboulevard.com – Author: Team Nuspire Cyber threat actors continue to focus much of their sights and tactics on compromising endpoint devices like workstations, laptops and...
Embattled LastPass Enforcing 12-Character Passwords for All – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Password manager vendor LastPass, beset by high-profile data breaches from 2022 that affected millions of users, is strengthening the security...
USENIX Security ’23 – Changlai Du, Hexuan Yu, Yang Xiao, Y. Thomas Hou, Angelos D. Keromytis, Wenjing Lou – ‘UCBlocker: Unwanted Call Blocking Using Anonymous Authentication’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Cloud Security, Governance and Skills in 2024 Step 1 of 6 16% Who in your organization is responsible for cloud...
Privacy regulation Understanding the Role of ISO IEC 27701
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Practice Fined $160K for 6 ‘Right of Access’ Complaints – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Healthcare , HIPAA/HITECH , Industry Specific Settlement Is HHS OCR’s 46th Enforcement Action Based on Health Record Complaints Marianne Kolbasuk McGee...
Accenture Buys 6point6 to Expand Cyber Portfolio in UK – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cloud Security , Electronic Healthcare Records , Governance & Risk Management UK Tech Firm Specializes in Cloud, Data and Cybersecurity Solutions...
Breach Roundup: DOJ Fines XCast $10M for Illegal Robocalls – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Breach Notification , Cybercrime , Fraud Management & Cybercrime Also: Mandiant X Account Hijacked in Cryptocurrency Scam Prajeet Nair (@prajeetspeaks) •...
Hospitals Sue LockBit, Ask Cloud Firm to Return Stolen Data – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cybercrime , Fraud Management & Cybercrime , Healthcare NY Hospital Group Claims Cybercriminals Kept Data on Boston-Based Firm’s Servers Marianne Kolbasuk...
Enterprise Risk Management Playbook
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Enhancing Cybersecurity and Compliance in Power Transmission & Distribution with Integrated Log Management and Asset Inventory Management
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Embedding Security Behaviours Using the 5Es
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Elevating APT Mastery for Cybersecurity Practitioners
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
El Libro Blanco del CISO
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...























