In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns

Noteworthy stories that might have slipped under the radar: Moscow sewage system hacked, a new women in cybersecurity report, PasteHub domain seized by law enforcement. 
The post In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Sec… Continue reading In Other News: Moscow Sewage Hack, Women in Cybersecurity Report, Dam Security Concerns

Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

With automated, detailed, contextualized threat intelligence, organizations can better anticipate malicious activity and utilize intelligence to speed detection around proven attacks.
The post Why Intelligence Sharing Is Vital to Building a Robust Col… Continue reading Why Intelligence Sharing Is Vital to Building a Robust Collective Cyber Defense Program

How threat intelligence data maximizes business operations

Threat intelligence is no longer a ‘nice to have’ for organizations but a ‘must,’ as it provides leaders with critical insight into their business. If leveraged correctly, threat intelligence is not just a cybersecurity asset but also gives organizatio… Continue reading How threat intelligence data maximizes business operations

Risk and Regulation: Preparing for the Era of Cybersecurity Compliance

The next twelve months will see the implementation of several regulations designed to improve cybersecurity standards across various industries.
The post Risk and Regulation: Preparing for the Era of Cybersecurity Compliance appeared first on SecurityW… Continue reading Risk and Regulation: Preparing for the Era of Cybersecurity Compliance

Outsmarting cybercriminal innovation with strategies for enterprise resilience

In this Help Net Security interview, Pedro Cameirão, Head of Cyber Defense Center at Nokia, discusses emerging cybersecurity trends for 2024 and advises enterprises on preparation strategies. Cameirão will speak at GISEC Global 2024 in Dubai, a confere… Continue reading Outsmarting cybercriminal innovation with strategies for enterprise resilience

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate

Red Canary’s 2024 Threat Detection Report is based on analysis of almost 60,000 threats across 216 petabytes of telemetry from over 1,000 customers’ endpoints.
The post Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate … Continue reading Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate

SecurityWeek Cyber Insights 2024 Series

Cyber Insights 2024 talks to hundreds of industry experts from dozens of companies covering seven primary topics.
The post SecurityWeek Cyber Insights 2024 Series appeared first on SecurityWeek.
Continue reading SecurityWeek Cyber Insights 2024 Series

State-sponsored hackers know enterprise VPN appliances inside out

Suspected Chinese state-sponsored hackers leveraging Ivanti Connect Secure VPN flaws to breach a variety of organizations have demonstrated “a nuanced understanding of the appliance”, according to Mandiant incident responders and threat hun… Continue reading State-sponsored hackers know enterprise VPN appliances inside out

From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements

Open source is a great way to test the waters and define requirements. But when looking at putting a platform into production, an enterprise-ready solution will ensure you can keep up with business demands.
The post From Open Source to Enterprise Ready… Continue reading From Open Source to Enterprise Ready: 4 Pillars to Meet Your Security Requirements