Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend

Here’s an overview of some of last week’s most interesting news and articles: Repairnator bot finds software bugs, successfully submits patches Can a bot create valid, high-quality fixes for software bugs more rapidly than a human can, and … Continue reading Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend

Week in review: Pentagon data breach, cybersecurity workforce gap, who gets spear phished?

Here’s an overview of some of last week’s most interesting news and articles: Who gets spear phished, and why? Spear phishing is one of the most successful methods of cyberattack. One countermeasure involves increasing employee awareness ab… Continue reading Week in review: Pentagon data breach, cybersecurity workforce gap, who gets spear phished?

Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free

Here’s an overview of some of last week’s most interesting news and articles: Researchers link Industroyer to NotPetya ESET researchers believe they have found evidence that the TeleBots APT was behind the December 2016 attacks against the … Continue reading Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free

Week in review: Facebook data breach fallout, BEC-as-a-Service, true password behaviors

Here’s an overview of some of last week’s most interesting news and articles: APTs are targeting IT service providers Managed service providers (MSPs) and cloud service providers (CSPs) are under attack by advanced persistent threat (APT) g… Continue reading Week in review: Facebook data breach fallout, BEC-as-a-Service, true password behaviors

Week in review: First-ever UEFI rootkit, Apple DEP vulnerability, new tactics subvert traditional security measures

Here’s an overview of some of last week’s most interesting news and articles: What do you mean by storage encryption? Depending on the threat context and how you define “storage encryption,” it can be a highly effective control or a complet… Continue reading Week in review: First-ever UEFI rootkit, Apple DEP vulnerability, new tactics subvert traditional security measures

Week in review: Shifting security priorities, phishing manipulation tactics, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Why identity verification needs to be a part of your digital transformation strategy Here are three key reasons why identity verification needs to be part of your… Continue reading Week in review: Shifting security priorities, phishing manipulation tactics, new issue of (IN)SECURE

Week in review: API security, malware-less email attacks, reversing the cybersecurity skills shortage

Here’s an overview of some of last week’s most interesting news and articles: What can we do to reverse the cybersecurity skills shortage? Having a strong pipeline of talent coming through is vital to help organizations and individuals prot… Continue reading Week in review: API security, malware-less email attacks, reversing the cybersecurity skills shortage

Week in review: Blocking compromised passwords, removing personal data from connected cars

Here’s an overview of some of last week’s most interesting news and articles: 0patch releases micropatch for Windows Task Scheduler zero-day Acros Security, the company behind 0patch, has released a micropatch for the flaw that can be appli… Continue reading Week in review: Blocking compromised passwords, removing personal data from connected cars

Week in review: DNS interception, critical Apache Struts flaw, cybersecurity career pathing

Here’s an overview of some of last week’s most interesting news and articles: The importance of career pathing in the cybersecurity industry A major issue facing our industry right now is a significant shortage of talented, skilled cybersec… Continue reading Week in review: DNS interception, critical Apache Struts flaw, cybersecurity career pathing