Monthly Archives: March 2019

Get your organization “Privilege Ready”

by Morey Haber, CTO, BeyondTrust People are organizations’ most valuable resource. But they can also be its greatest vulnerability, especially when armed with weak credentials, all-too-powerful privileged accounts, and security […]

Posted in Cyber Security News | Comments Off on Get your organization “Privilege Ready”

New study reveals widespread security vulnerabilities in popular apps

by Dr. Krisztina Pusok, director for research & public policy at the American Consumer Institute It’s becoming easier than ever for consumers to unknowingly download potentially damaging applications onto their […]

Posted in Cyber Security News | Comments Off on New study reveals widespread security vulnerabilities in popular apps

DMSniff POS Malware has flown under the radar for at least four years

Malware researchers at Flashpoint revealed that at least since 2016, a PoS malware dubbed DMSniff has flown under the radar. Malware researchers at Flashpoint revealed that since 2016, a PoS […]

Posted in Cyber Security News | Comments Off on DMSniff POS Malware has flown under the radar for at least four years

8 Cyber security tips For SMBs

By Sherie Raymond, the data security writer, and editor at Origin Writings It is a common story. A small to medium business believes that no one will hack them – […]

Posted in Cyber Security News | Comments Off on 8 Cyber security tips For SMBs

State of SOAR Report: Security teams feel human capital crunch as alerts grow

By Rishi Bhargava Today’s business landscape is a delicate balancing act between technological advancement and security. Workplace changes and technological innovations have made it easier to do business and live […]

Posted in Cyber Security News | Comments Off on State of SOAR Report: Security teams feel human capital crunch as alerts grow

Cyber security awareness month

Mind the Gap: Cultivating the Next Generation of Cyber Talent                       by Angie Lienert, President & CEO of IntelliGenesis, LLC There are currently 350,000 open cybersecurity positions in the U.S. […]

Posted in Cyber Security News | Comments Off on Cyber security awareness month

Microsoft Patch Tuesday updates for March 2019 patches two Windows flaws exploited in targeted attacks

Microsoft Patch Tuesday updates for March 2019 address 64 flaws, including two Windows zero-day vulnerabilities exploited in targeted attacks. Microsoft Patch Tuesday updates for March 2019 address 64 vulnerabilities, including […]

Posted in Cyber Security News | Comments Off on Microsoft Patch Tuesday updates for March 2019 patches two Windows flaws exploited in targeted attacks

Some Countermeasures to cyber attacks

by Milica D. Djekic Cyber incidents are something that would occur so frequently and it’s not the question if anyone would be breached, but rather when that would happen. In […]

Posted in Cyber Security News | Comments Off on Some Countermeasures to cyber attacks

How SMBs can prepare for California’s new data privacy law

by Ari Vared, Senior Director of Product, CyberPolicy On June 28, 2018, California legislators passed one of the toughest data privacy laws in the country. Targeting tech companies like Amazon, […]

Posted in Cyber Security News | Comments Off on How SMBs can prepare for California’s new data privacy law

Attack methodologies in practice

by Milica D. Djekic Many would believe that the attack methodologies got so complicated in practice. The case is that the skillful hacker would certainly know how to take advantage […]

Posted in Cyber Security News | Comments Off on Attack methodologies in practice

NETSCOUT ANALYSIS: FACEBOOK OUTAGE

Users around the world experienced an hours-long Facebook and Instagram outage today. The NETSCOUT Threat Intelligence team has investigated the source of the outage and observed the following: “At approximately […]

Posted in Cyber Security News | Comments Off on NETSCOUT ANALYSIS: FACEBOOK OUTAGE

Vulnerability research hub Crowdfense is willing to pay $3 Million for iOS, Android zero-day exploits

World-leading vulnerability research hub Crowdfense is offering up to $3 million for full-chain, zero-day exploits for iOS and Android. Vulnerability research firm Crowdfense is offering up to $3 million for […]

Posted in Cyber Security News | Tagged , , , , , | Comments Off on Vulnerability research hub Crowdfense is willing to pay $3 Million for iOS, Android zero-day exploits

March 2019 – Patch Tuesday Analysis

As March Patch Tuesday landed I happened to be in a room full of IT Admins talking about best practices for patch management. One of those best practices happened to […]

Posted in Cyber Security News | Comments Off on March 2019 – Patch Tuesday Analysis

The safe progress

by Milica D. Djekic Since the 18th century and the first steam engine over the 19th and 20th century and the beginning of electrification unless the end of the 20th […]

Posted in Cyber Security News | Comments Off on The safe progress

6 Things to check before selecting a cyber security score

by Doug Clare, FICO Most cybersecurity experts agree it is no longer a matter of if, but simply a matter of when your organization will become the victim of a […]

Posted in Cyber Security News | Comments Off on 6 Things to check before selecting a cyber security score

How to internally respond after a breach

by Nik Whitfield, CEO, Panaseer There is no such thing as 100% secure.  Frustrating for security professionals, but a fact of life as it’s now not about if but about […]

Posted in Cyber Security News | Comments Off on How to internally respond after a breach

Crooks use The Pirate Bay to spread PirateMatryoshka malware via reputed seeders

Crooks are abusing the torrent website The Pirate Bay to distribute the PirateMatryoshka malware that fuels the victim’s PC with unwanted software. Crooks abusing torrent services to distribute malware is […]

Posted in Cyber Security News | Comments Off on Crooks use The Pirate Bay to spread PirateMatryoshka malware via reputed seeders

Vulnerabilities in car alarm systems exposed 3 million cars to hack

Security experts at Pen Test Partners discovered several vulnerabilities in two smart car alarm systems put three million vehicles globally at risk of hack. The flaws could be exploited by […]

Posted in Cyber Security News | Comments Off on Vulnerabilities in car alarm systems exposed 3 million cars to hack

The Cyber Risk Handbook – Creating and Measuring Effective Cybersecurity Capabilities

Free eBook: “The Cyber Risk Handbook – Creating and Measuring Effective Cybersecurity Capabilities ($43 Value) FREE For a Limited Time” This resource is the practitioner’s guide to implementing, measuring and […]

Posted in Cyber Security News | Comments Off on The Cyber Risk Handbook – Creating and Measuring Effective Cybersecurity Capabilities

SaaS DNS Security: Are you Protected?

By Kanaiya Vasani, Executive Vice President, Products and Corporate Development at Infoblox Is Software as a Service (SaaS) security solutions truly the panacea they are publicized to be? The answer […]

Posted in Cyber Security News | Comments Off on SaaS DNS Security: Are you Protected?

How Organizations Should Choose a Load Balance for Managing and Securing Application Traffic in the Cloud

By Kamal Anand, Vice President and General Manager, Cloud Business Unit at A10 Networks Load balancing of application traffic has been around for a long time. But, as more organizations move […]

Posted in Cyber Security News | Comments Off on How Organizations Should Choose a Load Balance for Managing and Securing Application Traffic in the Cloud

Shattered! Security in a Fragmented World of Workloads

By Satyam Tyagi, Director Product Management, ColorTokens Inc.  Look at me, I’m in tatters! Don’t you know the crime rate is going up, up, up, up, up? To live in […]

Posted in Cyber Security News | Comments Off on Shattered! Security in a Fragmented World of Workloads

Software Should Come with a “Nutrition” Label

By Tae Jin “TJ” Kang, CEO, Insignary, Inc. During the latter half of the 18th Century and throughout the 19th Century, the Industrial Revolution fundamentally changed the geographical, political and […]

Posted in Cyber Security News | Comments Off on Software Should Come with a “Nutrition” Label

Phishing in the Dark: Employee Security Gaps Are Growing

By Atif Mushtaq, CEO of SlashNext Phishing is often equated with phishing emails containing malware attachments or links to malicious sites. However, as email security solutions improve and phishing awareness […]

Posted in Cyber Security News | Comments Off on Phishing in the Dark: Employee Security Gaps Are Growing

Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model

By Tae Jin “TJ” Kang As software becomes more sophisticated, organizations of all sizes continue to harness its capabilities to transform their go-to-market strategies and streamline their operations. Whether the […]

Posted in Cyber Security News | Comments Off on Overcoming Software Security Issues Caused by the Third-Party Software Procurement Model

Prioritizing Security in a Multi-Cloud World

By Scott Manson, Managing Director, Middle East & Turkey, McAfee Cloud awareness and adoption continues to grow, as more enterprises take advantage of the benefits that come with multiple cloud […]

Posted in Cyber Security News | Comments Off on Prioritizing Security in a Multi-Cloud World

Operation Eligible Receiver – The Birth Place of Cyber security: Configurations

By Josh Paape More than twenty years ago, the National Security Agency conducted an exercise to test the response capabilities of critical Department of Defense information systems in the case […]

Posted in Cyber Security News | Comments Off on Operation Eligible Receiver – The Birth Place of Cyber security: Configurations

Why Wi-Fi Hacking Will Persist Despite WPA3

By Ryan Orsi, Director Product Management, WatchGuard Technologies In 2017, the famed Key Re-installation Attack or “Krack” attack shocked the world by defeating WPA2 encryption. As a result, the Wi-Fi […]

Posted in Cyber Security News | Comments Off on Why Wi-Fi Hacking Will Persist Despite WPA3

Want to Secure Your Endpoints? Go Beyond the Endpoint

By Jai Balasubramaniyan, Director of Product Management, ColorTokens Inc.  Traditional endpoint security control has always been about malware, threat analysis, and remediation. However, it is useless for an endpoint to […]

Posted in Cyber Security News | Comments Off on Want to Secure Your Endpoints? Go Beyond the Endpoint

Changing the Economics of Responding to Cyber Attacks in the Healthcare Sector

By John Attala, Director, North America, Endace The healthcare sector has been and continues to be under attack. As long as malicious criminals and hackers have the upper hand in […]

Posted in Cyber Security News | Comments Off on Changing the Economics of Responding to Cyber Attacks in the Healthcare Sector

12th Anniversary Global InfoSec Awards for 2024 are now Open! Take advantage of co-marketing packages and enter today!

X