We’ve heard this debate for years. Which computing environment is easier to protect your sensitive data: public cloud or on premise? Check out this post for the…
Iran-linked APT activity on the rise Security researchers at Cybereason observed a spike in activity from APT35, a group with links to Iran also known…
Here is a quick five-minute video of highlights from CISO Series Video Chat: “Hacking Data First Security: An hour of critical thinking about focusing your…
Cyber attack disrupts German oil firm operations On Tuesday, two German oil storage and logistics firms, Oiltanking GmbH Group and Mabanaft Group indicated they are…
Your GPU knows your secrets Researchers from Ben-Gurion University and the University of Lille published a paper demonstrating a new GPU fingerprinting method called DrawnApart.…
Winning at vulnerability management is not a numbers game. It’s a tactical exercise of what matters most in your environment. Surprisingly, experts tell us close…
Novel device registration trick enhances multi-stage phishing attacks Microsoft has shared details of a large-scale phishing campaign that leverages stolen credentials to register devices on…
This week’s Cyber Security Headlines – Week in Review, Jan 24-28, is hosted by Rich Stroffolino with our guest, Gary Hayslip, CISO, Softbank Investment Advisers…
US says national water supply ‘absolutely’ vulnerable to hackers Cyber defenses for US drinking water supplies are “absolutely inadequate” and vulnerable to large-scale disruption by…
Security professionals are drowning in activities. Not all of them can be valuable. What should security professionals stop doing to get back some time? Check…
White House releases new cybersecurity strategy The strategy was published as a memorandum from the Office of Management and Budget and intended for the heads…
Please join us on Friday, February 11th, 2022 for CISO Series Video Chat: “Hacking Promises of Automation: An hour of critical thinking of what manual…
Here is a video full of highlights from CISO Series Video Chat: “Hacking Distributed Denial of Service (DDoS): An hour of critical thinking about how…
Canada’s foreign ministry hacked As of Monday night, Canadian cybersecurity officials were still working to restore internet services of Canada’s foreign ministry, which were affected…
If you’re asking what certification you should go after to get the perfect cybersecurity job, you’re asking the wrong question. Most hiring managers are inundated…
SBA launches cybersecurity program The US Small Business Administration launched the Cybersecurity for Small Business Pilot program, offering $3 million in grants to help smaller…
Here is Brian Vecci (@BrianTheVecci), field CTO, Varonis, providing seven explanations of data first security in about 90 seconds. It’s a simple preview of this Friday’s [01-28-22]…
Ukraine attack update: experts find strategic similarities with NotPetya Latest analysis into the wiper malware that targeted dozens of Ukrainian agencies while disguised as ransomware…
This week’s Cyber Security Headlines – Week in Review, Jan 17-21, is hosted by Rich Stroffolino with our guest, Julie Tsai, Cybersecurity Leader Cyber Security…
NATO and Ukraine sign deal to boost cybersecurity The agreement comes after a series of cyberattack incidents in Ukraine and heightened tensions over Russia’s invasion.…
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.