Week in review: Marriott data breach, GDPR’s impact, HITBSecConf2018 Dubai

Here’s an overview of some of last week’s most interesting news and articles: The fundamentals of network security and cybersecurity hygiene The two fundamental building blocks to ensuring that your data is secure are physical infrastructur… Continue reading Week in review: Marriott data breach, GDPR’s impact, HITBSecConf2018 Dubai

Week in review: The lessons of Conficker, holiday season cybercrime, IoT vulnerability discovery

Here’s an overview of some of last week’s most interesting news and articles: Don’t accept risk with a pocket veto No security professional wants to accept risk. If we had our way, the organization would mitigate or avoid all risks. But tha… Continue reading Week in review: The lessons of Conficker, holiday season cybercrime, IoT vulnerability discovery

Week in review: Vaporworms, DevOps roadmap for security, ethical data management

Here’s an overview of some of last week’s most interesting news and articles: Cybersecurity and ethical data management: Getting it right Laura Norén, director of research at Obsidian Security and a sociologist with an interest in the socia… Continue reading Week in review: Vaporworms, DevOps roadmap for security, ethical data management

Week in review: VirtualBox 0day, GPU side channel attacks, vulnerable self-encrypting SSDs

Here’s an overview of some of last week’s most interesting news and articles: Five key considerations when developing a Security Operations Center Organizations should start with the following five key considerations if they are to get the … Continue reading Week in review: VirtualBox 0day, GPU side channel attacks, vulnerable self-encrypting SSDs

Week in review: Bleedingbit, nastiest malware of 2018, Cisco security appliances under attack

Here’s an overview of some of last week’s most interesting news and articles: New techniques expose your browsing history to attackers Security researchers at UC San Diego and Stanford have discovered four new ways to expose Internet users’… Continue reading Week in review: Bleedingbit, nastiest malware of 2018, Cisco security appliances under attack

Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend

Here’s an overview of some of last week’s most interesting news and articles: Repairnator bot finds software bugs, successfully submits patches Can a bot create valid, high-quality fixes for software bugs more rapidly than a human can, and … Continue reading Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend

Week in review: Pentagon data breach, cybersecurity workforce gap, who gets spear phished?

Here’s an overview of some of last week’s most interesting news and articles: Who gets spear phished, and why? Spear phishing is one of the most successful methods of cyberattack. One countermeasure involves increasing employee awareness ab… Continue reading Week in review: Pentagon data breach, cybersecurity workforce gap, who gets spear phished?

Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free

Here’s an overview of some of last week’s most interesting news and articles: Researchers link Industroyer to NotPetya ESET researchers believe they have found evidence that the TeleBots APT was behind the December 2016 attacks against the … Continue reading Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free

Week in review: Facebook data breach fallout, BEC-as-a-Service, true password behaviors

Here’s an overview of some of last week’s most interesting news and articles: APTs are targeting IT service providers Managed service providers (MSPs) and cloud service providers (CSPs) are under attack by advanced persistent threat (APT) g… Continue reading Week in review: Facebook data breach fallout, BEC-as-a-Service, true password behaviors

Week in review: First-ever UEFI rootkit, Apple DEP vulnerability, new tactics subvert traditional security measures

Here’s an overview of some of last week’s most interesting news and articles: What do you mean by storage encryption? Depending on the threat context and how you define “storage encryption,” it can be a highly effective control or a complet… Continue reading Week in review: First-ever UEFI rootkit, Apple DEP vulnerability, new tactics subvert traditional security measures