Monthly Archives: May 2019
Checkers double drive-thru restaurants chain discloses card breach
Checkers and Rally’s, one of the largest chains of double drive-thru restaurants in the United States, disclosed a credit card breach. “We recently became aware of a data security issue […]
Cybersecurity facts to focus on in 2018
By Greg Mosher, Avast’s VP of Engineering As fast as cybercriminals adapt to work their way around security defenses, new techniques and tactics for preventing hacks, infections and data breaches […]
Could our web dependency cost us a lot?
By Milica D. Djekic What is in common to the DDoS and any ransomware attacks? We could confidently say it’s their ability to get used as the sabotage weapons. If […]
Misaddressed emails were the #1 data security incident reported in 2017
Tim Sadler comments on the alarming statistic released by the Information Commissioner’s office stating that misaddressed emails were the number form of data loss in 2017. Tim Sadler is CEO […]
Research from Trustwave Details New Trends in Cyberattacks
Social engineering, sextortion campaigns and retail attacks are on the rise as enterprises strengthen security efforts and increase incident response time A new research report from Trustwave highlights an interesting […]
News aggregator Flipboard disclosed a data breach
The news aggregator Flipboard announced that it suffered a breach, unauthorized users had access to some databases storing user account information. The news and social media aggregator Flipboard disclosed on […]
Data Breach Risks and Responses for Business Leaders
By Jerry Thompson The cybersecurity threat landscape is now more fraught than ever. New revelations on the scope and severity of 2017’s Equifax hack seem to roll out by the […]
The Security Behind E-Signatures
By Tim Bedard, Director of Security Product Marketing, OneSpan E-signatures have been helping enterprises transform their operations for 25 years. Companies in both the public and private sectors deploy e-signatures […]
Is C-Level Security Talk Resulting in Action?
EXECUTIVES SAY SECURITY IS TOP OF MIND, BUT SEARCH DATA PROVES OTHERWISE By Ben Lorica, Chief Data Scientist, O’Reilly From media headlines to industry surveys, most business executives across industries […]
MEASURE YOUR SECURITY
Why measurement is at the core of Analogue Network Security, and why Cybersecurity without metrics is a fool’s errand by Winn Schwartau, Founder & CVO, The Security Awareness Company The […]
BlueKeep scans observed from exclusively Tor exit nodes
GreyNoise experts detected scans for systems vulnerable to the BlueKeep (CVE-2019-0708) vulnerability from exclusively Tor exit nodes. Microsoft Patch Tuesday updates for May 2019 address nearly 80 vulnerabilities, including an RDS […]
IIoT Security and the Threats invited by Public Networks
by Stewart Kantor, CEO, and co-founder of Full Spectrum Inc. Interconnectivity has become a norm in today’s society, with everything from your smartphone to your increasingly automated home and vehicle. […]
Top 5 Ways to Combat Insider Threat
by Dr. Eric Cole I’ve been talking about insider threat for nearly 10 years and advocating the position that compromising an insider is a lot easier for an adversary than […]
Keep hackers from boarding your network with a Cyber No-Fly list
By Hugh Njemanze, CEO, Anomali According to a recent report from the Online Trust Alliance, 2017 marked another “worst year ever” for cyber attacks. Businesses across every sector experienced nearly […]
Your Guide to Encrypting Files in Linux
Your Guide to Encrypting Files in Linux If your organization is one of the many that uses Linux operating systems to run key business processes, it’s important to implement the […]
First American Financial exposed 16 years’ worth of personal and financial documents
The US real-estate insurance biz, First American Financial, accidentally leaked customers’ highly personal files online, hundreds of millions of documents. The US real-estate insurance company First American Financial Corp. accidentally leaked […]
SiteLock 2019 Website Security Report: Protecting Websites in the Age of Stealth Attacks
Among the cryptojacking-buzz, Facebook’s data breach saga, and nation-state attacks on companies like Nissan, you likely noticed a trend of high-profile cybercrime in 2018. However, after studying website attacks that […]
Computer Bug History – Notable pests from the last 30 years
by James Smith, Bugsnag CEO Over the last three months, the media including Cyber Defense Magazine has reported what seems to be one computer bug after another, including the Meltdown […]
SandboxEscaper disclosed 3 Microsoft Zero-Day in 24 Hours
Yesterday SandboxEscaper publicly disclosed a Windows zero-day vulnerability, now she disclosed other two unknown issues in less than 24 hours. Just Yesterday, the popular developer SandboxEscaper publicly disclosed a Windows […]
Attackers on Rampage
Lack of knowledge can cost you a lot By Charles Chipiliro Chioko, IT Security Compliance Officer, NICO Technologies Limited Gone are the days where people get worried about viruses which […]
Ahead of the 2018 US midterms, how can we respond to foreign voting interference?
By Brent Whitfield, CEO at DCG Technical Solutions Inc. Whether the attempts of foreign agents to affect the 2016 presidential election had a significant effect or not, many eyes have […]
Snapchat staff used internal tools to spy on users
Snapchat internal staff has allegedly abused their role in the company to spy on Snapchat users using and internal tools and steal data. Snapchat is a multimedia messaging app that makes pictures, videos, […]
Security Forecast: Cloudy with a chance of doom!
A brief digest from the 2019 Thales Data Security Summit Washington, D.C. – When my train pulled into Union Station, the weather forecast called for overcast, gray skies. Little did […]
Third-Party Patching
A vendor-neutral framework for addressing the other 85% of vulnerabilities by Duncan McAlynn, Cybersecurity Consultant If your organization is like most, you likely have clearly defined processes in place for […]
SSH: The Two-Edged Sword in Your Security Strategy
What you don’t know can hurt you by Thomas MacIsaac, Cybersecurity Strategist, SSH Communications Security Cybercrime is as old as the internet, which means there has always been a need […]
Don’t Get Caught by Ransomware
by Aarij Khan, Vice President of Marketing, Securonix As businesses increasingly rely on digital systems, networks, and data for operations, the value of maintaining the integrity and availability of these […]
Tech and IT Companies are Driving Cloud Security Investments
A new survey shows how companies in different regions and industries deal differently with cloud security risks by Michael Fimin, CEO and Co-Founder Netwrix Regardless of how long organizations have […]
GDPR Privacy Laws: Ramifications and Possible Interdictions for Open Source Security Vulnerabilities
By Tae Jin “TJ” Kang The Data Protection Directive 95/46/EC, adopted in 1995, was an attempt by the European Union to create a unified set of data privacy rules for […]
Cloud Clout & the Chinese agnostic
by David Nagrosst, Entrepreneurial Leader and CISSP Qualified Cyber Security Expert All three of the world’s largest hosting companies – Amazon, Alibaba Group, and Microsoft – have achieved their positions […]
How We Can Secure The Energy Grid and the Smart Home Of The Future
by Uri Kreisman, COO, Bluechip Systems On August 15th, 2012, the Saudi Arabian group Saudi Aramco suffered a malware attack called “Shamoon” that damaged about thirty thousand computers. The state-owned […]