EA’s Source: It’s in the Game (and in Hackers’ Hands)

Electronic Arts got hacked, and its source code stolen. Hackers took hundreds of gigabytes of game source code and tools.
The post EA’s Source: It’s in the Game (and in Hackers’ Hands) appeared first on Security Boulevard.
Continue reading EA’s Source: It’s in the Game (and in Hackers’ Hands)

Why Freelancers Should Prioritise Cybersecurity

Article by Beau Peters
As a freelancer in any industry, you are likely more susceptible to hackers and cybercrime than many other professions. Not only are you pulling in a constant stream of customer data, but as a worker on the go, you likely work … Continue reading Why Freelancers Should Prioritise Cybersecurity

Behind the Scenes: A Conversation with Virsec’s CTO of the Year

Several weeks ago, we were thrilled to learn that our Founder and Chief Technology Officer, Satya Gupta, was named CTO of the Year in the 2021 Global InfoSec Awards. 
 For the last nine years, the Cyber Defense Magazine Global InfoSec Awards have … Continue reading Behind the Scenes: A Conversation with Virsec’s CTO of the Year

Breach Clarity Weekly Data Breach Report: Week of June 7

Each week Breach Clarity, recently acquired by Sontiq, compiles a list of what it considers to be notable data breaches—those that are worth highlighting because of the increased intensity of the risk to personal information. The Breach Clarity score … Continue reading Breach Clarity Weekly Data Breach Report: Week of June 7

Who Wore It Better? JBS Paid Ransom, Fujifilm Did Not

If those burgers you throw on the grill are even more expensive this summer, this might be one of the reasons. Meat processor JBS USA paid out $11 million to hackers after a ransomware attack compelled it to shutter beef processing in the U.S. and par… Continue reading Who Wore It Better? JBS Paid Ransom, Fujifilm Did Not

CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

We want to trust our employees and contractors working within our organizations. For the most part, people are doing their jobs with integrity every day. What happens when an employee decides to leave the organization and start their own business … Continue reading CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

Genius! Apple Bribes Woman over Naked Pic Theft

Apple is under fire for its hypocrisy in the case of techs who stole naked pictures and video from a woman’s iPhone.
The post Genius! Apple Bribes Woman over Naked Pic Theft appeared first on Security Boulevard.
Continue reading Genius! Apple Bribes Woman over Naked Pic Theft

Leverage Device Control Plus to secure Mac endpoints and prevent data breaches via peripheral devices

With more than 1.4 billion devices in use, Apple has become a household name in technology. Anyone who is familiar with the Apple ecosystem will commend the functionality and interoperability of Apple devices. Made possible by the distinctive practice … Continue reading Leverage Device Control Plus to secure Mac endpoints and prevent data breaches via peripheral devices

Protecting Industrial Control Systems Against Cyberattacks – Part 3

In the third installment of our series, Protecting Industrial Control Systems Against Cyberattacks, we explore additional risk factors and vulnerabilities facing ICS SCADA systems. If you haven’t already, please go back and read part 1 and part 2 … Continue reading Protecting Industrial Control Systems Against Cyberattacks – Part 3

Palo Alto Networks Extends Scope of CSPM Platform

Palo Alto Networks today updated its cloud security posture management (CSPM) platform to include a range of capabilities that make it simpler for security teams to prioritize which cloud threats they respond to first. Ankur Shah, vice president of pr… Continue reading Palo Alto Networks Extends Scope of CSPM Platform