Finding Zoom Meeting Details in the Wild

The popular web conference platform Zoom has been in the storm for a few weeks. With the COVID19 pandemic, more and more people are working from home and the demand for web conference tools has been growing. Vulnerabilities have been discovered in the Zoom client and, based on the fact

[The post Finding Zoom Meeting Details in the Wild has been first published on /dev/random]

Continue reading Finding Zoom Meeting Details in the Wild

From Good to Great – Building on ICS Security Basics

Most industrial organizations are behind the curve when it comes to cybersecurity, facing mounting complexities like the IIoT, the skills gap and the IT/OT divide. But what about industrial organizations that are already taking steps in the right direc… Continue reading From Good to Great – Building on ICS Security Basics

How Virtualization Protects Your High-Value Assets [Webinar]

Networks and devices will keep getting compromised. You need a strategy to protect your most critical applications and assets. Bromium Protected App protects your high-value assets (HVAs) against compromised devices On October 23, 2018, analysts f… Continue reading How Virtualization Protects Your High-Value Assets [Webinar]

How PCI/DSS Compliance Can Protect Your Systems against New Ransomware Threats

Two significant ransomware attacks occurred in the first half of 2017. The first outbreak took place on May 12, 2017, when WannaCry leveraged a known Windows exploit to infect hundreds of thousands of vulnerable computers around the world, including 34… Continue reading How PCI/DSS Compliance Can Protect Your Systems against New Ransomware Threats

IDC’s Frank Dickson to Discuss Innovative Approaches to Cybersecurity [Webinar]

Frank Dickson, IDC Research Director, Security Products, authored the IDC Perspective, “Validating the Known: A Different Approach to Cybersecurity” Join this live webinar on February 22 to hear Frank present his research and ask him your q… Continue reading IDC’s Frank Dickson to Discuss Innovative Approaches to Cybersecurity [Webinar]

SC Magazine Webcast – IBM 20/20 Webcast

SC Magazine is pleased offer a unique webcast series – SC Magazine 20/20. The free webcast series features a member of the SC Magazine editorial team sitting down with various industry thought leaders to discuss the past, present and future of IT security. Our next webcast in the series: […] Continue reading SC Magazine Webcast – IBM 20/20 Webcast