Sam Quakenbush Senior Director – Field Innovation & Strategy, Mend Sam Quakenbush has spent the past 10 years working for cyber security companies covering various domains...
Just Who Exactly Should Take Responsibility for Application Security?
Application Security & Online Fraud , Fraud Management & Cybercrime , Security Operations Carol Hilderbrand • March 23, 2023 Recent high-profile software supply chain...
Look Beyond TikTok: Massive Data Collection Is the Real Risk
Fraud Management & Cybercrime , Social Media All Social Media Apps Collect Information on a Scale That Facilitates Surveillance Mathew J. Schwartz (euroinfosec) • March 29,...
Law Enforcement Lures Cybercriminals With Fake DDoS Services
Cybercrime , DDoS Protection , Fraud Management & Cybercrime ‘We’re Running Stresser/Booter Distributed Denial-of-Service Sites,’ Cops Caution Mathew J. Schwartz (euroinfosec) • April 6, 2023 ...
The Persisting Risks Posed by Legacy Medical Devices
Recently enacted U.S. legislation requiring vendors to design cybersecurity into medical devices is a good first step, but healthcare delivery organizations for many years to come...
Showing Evidence of ‘Recognized Security Practices’
3rd Party Risk Management , Business Continuity Management / Disaster Recovery , Critical Infrastructure Security Robert Booker, Chief Strategy Officer of HITRUST, on Providing Proof to...
Aité-Novarica’s Cybersecurity Impact Award
This episode covers the highlights of Aite-Novarica’s first-ever Cybersecurity Impact Award and announces that Radiant Logic was chosen as the winner for 2022. In this episode,...
LIVE Webinar | Moving from Alerts to Action: An Agency Exclusive SOAR Discussion
DevSecOps , Next-Generation Technologies & Secure Development Presented by Palo Alto Networks 60 minutes Security alerts have more than doubled in the...
Researchers Find Flaws in Japanese Word Processor Ichitaro
Endpoint Security JustSystems, Maker of Ichitaro, Says No Attacks Have Been Spotted Jayant Chakravarti (@JayJay_Tech) • April 7, 2023 Image: Shutterstock Security researchers uncovered...
Microsoft PowerToys adds Windows Registry preview feature
Microsoft PowerToys, a set of free utilities for Windows 10 users, has introduced a new feature allowing users to preview registry file contents before importing them....
All Dutch govt networks to use RPKI to prevent BGP hijacking
The Dutch government will upgrade the security of its internet routing by adopting before the end of 2024 the Resource Public Key Infrastructure (RPKI) standard. RPKI,...
Stop Blaming the End User for Security Risk
It’s common among cybersecurity professionals to point to the end user as a top area of risk in securing the organization. This is understandable. Systems and...
Spera Takes Aim at Identity Security Posture Management
Identity security startup Spera came out of stealth with $10 million in seed funding and a platform to protect enterprises from identity-driven threats. Spera is carving...
Top Tech Talent Warns of AI’s Threat to Human Existence in Open Letter
More than 1,000 of technology’s top talent names — including Twitter CEO Elon Musk, Apple co-founder Steve Wozniak, and politician Andrew Yang — have signed an...
Cybercrime: be careful what you tell your chatbot helper…
Concerns about the growing abilities of chatbots trained on large language models, such as OpenAI’s GPT-4, Google’s Bard and Microsoft’s Bing Chat, are making headlines. Experts...
CISA adds Veritas Backup Exec flaws to its Known Exploited Vulnerabilities catalog
US CISA has added Veritas Backup Exec flaws, which were exploited in ransomware attacks, to its Known Exploited Vulnerabilities catalog. U.S. Cybersecurity and Infrastructure Security Agency...
Breached shutdown sparks migration to ARES data leak forums
A threat group called ARES is gaining notoriety on the cybercrime scene by selling and leaking databases stolen from corporations and public authorities. The actor emerged on...
Western Digital struggles to fix massive My Cloud outage, offers workaround
On Friday, five days into a massive outage impacting its cloud services, Western Digital finally provided customers with a workaround to access their files. Since April...
Microsoft delays Exchange Online CARs deprecation until 2024
Microsoft announced today that Client Access Rules (CARs) deprecation in Exchange Online will be delayed by one year until September 2024. Microsoft 365 administrators can utilize...
US Space Force Requests $700M for Cybersecurity Blast Off
US Space Force top brass have requested a $700 million investment in cybersecurity as part of the military branch’s overall $30 billion 2024 budget. The Russian...
What CISOs Can Do to Build Trust & Fight Fraud in the Metaverse
The online gaming industry has seen rapid growth since the COVID-19 lockdowns began. However, with more and more players and new platforms entering the space, we...
Post-Quantum Satellite Protection Rockets Towards Reality
Developers of post-quantum cryptography have successfully created a trial, data-transmission channel from Earth to satellites in multiple orbits that would be resistant to the hacking of...
Automatic Updates Deliver Malicious 3CX ‘Upgrades’ to Enterprises
Security researchers are sounding the alarm on what may well be another major SolarWinds or Kaseya-like supply chain attack, this time involving Windows and Mac versions...
BEC Fraudsters Expand to Snatch Real-World Goods in Commodities Twist
Some cybercriminals are flipping their playbook on business email compromise (BEC) scams and, rather than posing as vendors seeking payment, are now posing as buyers, taking...
How to Solve IoT’s Identity Problem
Network security and asset management products have to be able to identify what operating systems are currently running in the organization. With this information, IT and...
Microsoft Patches ‘Dangerous’ RCE Flaw in Azure Cloud Service
Microsoft has patched what researchers called a “dangerous” flaw in its Azure Service Fabric component of the company’s cloud-hosting infrastructure. If exploited, it would have allowed an...
Organizations Consider Self-Insurance to Manage Risk
As the market for cybersecurity insurance evolves and matures, insurance giant Lloyd’s of London is preparing to exclude most nation-state attacks from its coverage policies. In...
DataDome Closes $42M in Series C Funding to Advance the Fight Against Bot-Driven Cyberattacks and Fraud
NEW YORK, March 30, 2023 /PRNewswire/ — DataDome, a leading provider of AI-powered online fraud and bot management, today announced its Series C funding round of $42 million. This round...
Socura Launches Managed SASE (MSASE) Service
LONDON, March 30, 2023/PRNewswire/ — Socura, a UK-based cyber security managed services specialist, today announced the launch of its Managed SASE (Secure Access Service Edge) service...
Making a Business Case for Cyber Threat Intelligence: Unveiling the Value Realization Framework
By Kaustubh Medhe, Head of Research and Intelligence A recent market survey report (Source: Fortune Business Insights, March 2023) pegged the current market size of the...




























