Quantcast
Browsing all 1614 articles
Browse latest View live

Cycode rolls out ASPM connector marketplace, analysts see it as bare minimum

Cycode has announced what it called the first marketplace devoted to the application security posture management (ASPM) space, touting the availability of more than 100 connectors and integrations to...

View Article


Cyber resilience: A business imperative CISOs must get right

In May 2021, when Colonial Pipeline was targeted by the DarkSide hackers, CEO Joseph Blount made the highly controversial decision to pay the $4.4 million ransom. The attack put critical US...

View Article


US AI experts targeted in cyberespionage campaign using SugarGh0st RAT

Security researchers have warned about a new cyberespionage campaign that targets artificial intelligence experts working in private industry, government and academia. The attackers, likely of Chinese...

View Article

FCC proposes BGP security measures

Jessica Rosenworcel wants ISPs to tell her how they’re securing BGP (Border Gateway Protocol) , a critical system for routing internet traffic. The chairwoman of the US Federal Communications...

View Article

DDoS attacks: Definition, examples, and techniques

What is a DDoS attack? A distributed denial of service (DDoS) attack is when an attacker, or attackers, attempt to make it impossible for a service to be delivered. This could be sending a web server...

View Article


SEC rule for finance firms boosts disclosure requirements

The SEC announced rule changes for some financial companies that will require more customer disclosures when security incidents impact their personal information as well as mandate incident response...

View Article

The inside story of Cyber Command’s creation

In June 2009, the Department of Defense created US Cyber Command to address the rapid recognition among military brass that the computer systems they used were increasingly vulnerable to cyberattacks....

View Article

Global stability issues alter cyber threat landscape, ESET reports

Threat actors are boosting attacks across the globe, with geographic events influencing which regions are being hit the hardest, according to a new report from threat intel researchers ESET. Although...

View Article


Download the hybrid cloud data protection enterprise buyer’s guide

To safeguard your data in hybrid cloud environments, organizations need to apply basic data security techniques such as encryption, data-loss prevention, secure web gateways, and cloud-access security...

View Article


Employee discontent: Insider threat No. 1

In the world of insider risk management (IRM), how an employee views their relationship with their company is as important as how the company views its relationship with the employee. This might sound...

View Article

Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From...

Memcyco Inc., provider of digital trust technology designed to protect companies and their customers from digital impersonation fraud, released its inaugural 2024 State of Website Impersonation Scams...

View Article

Reducing CSO-CIO tension requires recognizing the signs

View Article

Rise of zero-day exploits reshape security recommendations

With zero-day attacks rapidly eclipsing exploits of known flaws, CISOs face the specter of having to switch up their security strategies in favor of post-exploitation response. That’s the key takeaway...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Azure’s Russinovich sheds light on key generative AI threats

Generative AI-based threats operate over a huge landscape, and CISOs must look at it from a variety of perspectives, said Microsoft Azure CTO Mark Russinovich during Microsoft Build conference this...

View Article

US government could mandate quantum-resistant encryption from July

Companies working on sensitive projects for the US government may soon be required to use encryption algorithms that protect their data and technology from quantum computer attacks. In July, the...

View Article


Memcyco Report Reveals Only 6% Of Brands Can Protect Their Customers From...

Memcyco Inc., provider of digital trust technology designed to protect companies and their customers from digital impersonation fraud, released its inaugural 2024 State of Website Impersonation Scams...

View Article

EU resilience regulation DORA has financial CISOs waiting for answers

It just over seven months, the Digital Operational Resilience Act (DORA) enters into force in the EU — and not every organization is prepared. The regulation, which will apply as of January 17, 2025,...

View Article


Hijack of monitoring devices highlights cyber threat to solar power...

In what might be the first publicly confirmed cyberattack on the solar power grid infrastructure, Japanese media recently reported that malicious actors hijacked 800 SolarView Compact remote...

View Article

Critical flaw found in Fluent Bit cloud services monitoring component

Security researchers at Tenable have discovered a potentially critical memory corruption vulnerability in Fluent Bit, a core component in the monitoring infrastructure of many cloud services. The...

View Article

Fake Pegasus spyware source code floods dark web

Cybercriminals are exploiting the notoriety of NSO Group’s Pegasus spyware to dupe victims on the dark web, according to cybersecurity firm CloudSEK. This revelation comes just weeks after Apple...

View Article
Browsing all 1614 articles
Browse latest View live