Week in review: Shifting security priorities, phishing manipulation tactics, new issue of (IN)SECURE

Here’s an overview of some of last week’s most interesting news and articles: Why identity verification needs to be a part of your digital transformation strategy Here are three key reasons why identity verification needs to be part of your… Continue reading Week in review: Shifting security priorities, phishing manipulation tactics, new issue of (IN)SECURE

Week in review: API security, malware-less email attacks, reversing the cybersecurity skills shortage

Here’s an overview of some of last week’s most interesting news and articles: What can we do to reverse the cybersecurity skills shortage? Having a strong pipeline of talent coming through is vital to help organizations and individuals prot… Continue reading Week in review: API security, malware-less email attacks, reversing the cybersecurity skills shortage

Week in review: Blocking compromised passwords, removing personal data from connected cars

Here’s an overview of some of last week’s most interesting news and articles: 0patch releases micropatch for Windows Task Scheduler zero-day Acros Security, the company behind 0patch, has released a micropatch for the flaw that can be appli… Continue reading Week in review: Blocking compromised passwords, removing personal data from connected cars

Week in review: DNS interception, critical Apache Struts flaw, cybersecurity career pathing

Here’s an overview of some of last week’s most interesting news and articles: The importance of career pathing in the cybersecurity industry A major issue facing our industry right now is a significant shortage of talented, skilled cybersec… Continue reading Week in review: DNS interception, critical Apache Struts flaw, cybersecurity career pathing

Week in review: Deploying automation securely, dark web activities that indicate a breach

Here’s an overview of some of last week’s most interesting news and articles: Industrial cybersecurity: Protecting OT from IT A powerful technique for protecting OT from IT, or to enforce whatever separation is required to ensure the integr… Continue reading Week in review: Deploying automation securely, dark web activities that indicate a breach

Week in review: Bluetooth flaw, ERP applications under attack, advancing security with machine learning

Here’s an overview of some of last week’s most interesting news and articles: SCADA vulnerabilities in ICS architectures A major challenge in industrial control system architecture involves the dual nature of its underlying technologies. Vu… Continue reading Week in review: Bluetooth flaw, ERP applications under attack, advancing security with machine learning