A report from Venafi titled "CIO Study: Software Build Pipelines Attack Surface Expanding" examines cybersecurity executive response to software supply chain security.
from Cyber Security News https://ift.tt/8x2qeyJ
Live Player 3.2 extension and toolbar is a corrupt browser application that ruins Firefox, Google Chrome and Internet explorer, etc. The Live Player 3.2 virus comes as a free TV channel player which offers its user watch various international TV shows and programs without paying anything. But soon after this program has been installed, you,ll
A report from Venafi titled "CIO Study: Software Build Pipelines Attack Surface Expanding" examines cybersecurity executive response to software supply chain security.
Cyber insurance won't stop a data breach, but it will protect small businesses from the high costs of a security breach or cyberattack.
Brindha McDonald has been named Chief Security Officer (CSO) at the U.K. Government Property Agency, leading infrastructure security and personnel security efforts.
There are four notable emerging cybersecurity threats in the domain name space organizations need to be aware of for improved brand protection.
Cybercriminals have used social engineering tactics to target financial organizations, according to a ZeroFox threat report.
New Specops research shows that regulatory password complexity and construction recommendations are insufficient.
Discover three enforcement mechanisms that are essential for any effective multi-cloud security program.
There are many cybersecurity resources for manufacturers looking to better protect their facilities from cyber threats like hacking, ransomware and insider threats.
It is time to switch the paradigm and focus on tools that protect subjects or end users with a new User-centric zero trust architecture.
Chicago Public Schools has suffered a data breach that compromised the personal information of 500,000 students and more than 56,000 employees.
From well publicized critical infrastructure attacks to massive supply chain breaches, the DBIR found five key trends in the security incidents analyzed.
In his role as CISO, Ron Sanderson will help strengthen Redpoint’s security approach while helping ensure data privacy and data security.
Georgetown University's Center on Privacy & Technology released a report detailing facial recognition technology use and driver's license searches conducted by the U.S. Immigration and Customs Enforcement agency (ICE).
Michael Mestrovich, former Chief Information Security Officer (CISO) at the CIA, has been named CISO at Rubrik, a data security firm.
Learn about 10 of the best tips to help security executives and their organizations move the needle from cybersecurity zero to hero.
Security and compliance are one of the most important accelerators for growth trajectory — one that the vast majority of early-stage startups overlook.
Security leaders in the energy sector must foreground industry-wide collaboration to protect their organizations from cybersecurity threats.
Kryptowire analyzed the top travel apps presenting cyber risks to their users as business travel and hybrid work evolve.
Despite costly fines and an increasingly-regulated environment, organizations of all sizes are not fully prepared for compliance with data privacy and data protection regulations like the GDPR.
U.S. automobile manufacturer General Motors (GM) has alerted customers of a data breach due to a credential stuffing attack last month.
It is more important than ever that small businesses understand how cyberattacks can impact their operations and take the proper steps to protect themselves.
As Chief Security Officer at Agora, Hale will work to navigate compliance and security, and determine risk management and cybersecurity best practices.
David "Dave" Maynor has been appointed Senior Director of Threat Intelligence at Cybrary, leading the new Cybrary Threat Intelligence Group (CTIG).
Among ransomware, software supply chain attacks and data breaches, a Blumira report found that identity-based attacks are the top threat organizations faced in 2021.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert listing 10 common initial access exploits for cybercriminals.
More than one-third of organizations are using AI to address skills and labor shortages and respond to competitive and environmental pressures, according to new IBM research.
Cybersecurity leader Jeffrey Aguilar has been named Chief Information Security Officer (CISO) at the County of Los Angeles.
As Chief Secure Technology Officer, Christopher Hoff will be responsible for the company’s technological innovation and security infrastructure.
There are three key elements to implementing a successful data breach communication strategy; an incident response plan, consistent communication, and transparency.
Reskilling should be one of the primary strategies companies use to build their cybersecurity workforce.
QNAP Systems urges users to update their network attached storage (NAS) devices to avoid exposure to the Deadbolt ransomware.
Chief information security officers (CISOs) from 14 countries list their top of mind cyber threats to their organizations.
Energy executives anticipate life, property and environment-compromising cyberattacks on the sector, according to new cybersecurity research by DNV.
90% of IT and cybersecurity professionals are not confident in their ability to stop an advanced cyberattack, according to the 2022 Global State of Security report from Infoblox.
Pro-Russia hacker group Killnet has claimed responsibility for cyberattacks on many Italian institutions, declaring "war" on 10 countries including the United States.
Security magazine covers the top five cyber threats in Q1 2022, as outlined by Kroll's "Q1 2022 Threat Landscape: Threat Actors Target Email for Access and Extortion" report.
U.S. officials have warned businesses against hiring IT staff from North Korea, as they may expose themselves to legal consequences and insider risk.
Hackers exploited a popular Discord bot to deceive users into clicking malicious links inside Discord servers of several popular nonfungible tokens (NFT) projects.
Here are some key insights and considerations for small business owners looking to clean up their data and cybersecurity practices — just in time for spring.
Given recent geopolitical events, is it time to consider constructing a Strategic Electricity Reserve (SER) for national security reasons?
Cybersecurity professionals can help protect their organizations from cyberattacks during this time of global crises.
Nearly 60% of organizations experienced data loss or exfiltration caused by an employee mistake on email in the last 12 months, according to new research from Tessian.
A survey by Pulse and Hitachi ID explored password management strategies used by IT, security and cybersecurity leaders.
Enterprise SIEMs contain detections for fewer than 5 of the top 14 ATT&CK techniques employed by adversaries in the wild.
Companies have to get smart about the risks of social media and take steps to address them.
Learn about three cybersecurity threats the education sector will face this year as well as suggestions for how to thwart them.
Communicating the importance of security in the C-suite comes down to speaking their language. Dive into the ways security leaders can advocate for risk management in the boardroom and uncover fraud trends during the COVID-19 pandemic in this podcast episode.
The conflict in Ukraine presents the threat of an increase in cyberattacks, not just for Ukrainian government agencies and companies, but worldwide. What can you do to keep your institution secure?
To help expand the UK's cybersecurity workforce, (ISC)² announced it will offer free certification and education for 100,000 cybersecurity career pursuers.
U.S. and EU stakeholders will partner to address supply chain challenges and expand access to digital tools for small to medium-sized enterprises.
The Equifax breach has taught and will continue to teach essential cybersecurity lessons that can help security leaders better protect the organization.
Small- to mid-sized business (SMB) security leaders need to protect their organizations from ransomware attacks. Here are five cost-effective solutions.
A survey by IDC and Zerto, "The State of Ransomware and Disaster Preparedness: 2022," found that 93% of North American and Western European medium and large organizations have experienced a business disruption due to data issues in the past twelve months.
Without zero trust as the foundation of your security, the APIs you use could become weak points.
Most organizations that have suffered a ransomware attack would choose to pay the ransom if hit again.
A study from General Dynamics Information Technology (GDIT) measured zero trust maturity in federal agencies since the Executive Order on Improving the Nation's Cybersecurity was released in May 2021.
How can your organization build the technical foundation for a comprehensive security program and what are the tools and processes necessary to develop that foundation into a mature vulnerability assessment and risk management program?
Discover steps security teams can follow for understanding potential threats in times of instability and be better armed for any sort of contingency.
There are several other reasons an organization should look to become HITRUST certified: improved competitive advantage, cybersecurity, risk management and more.
Simplify and consolidate. Embracing this approach will do more than strengthen security postures — it will help decrease burnout, prevent data breaches and more.
Five years after the WannaCry ransomware attack, ransomware continues to be one of the most significant cybersecurity threats facing enterprises in 2022.
Emotet has become the most common malware family detected in Q1 2022 (representing 9% of all malware captured), according to a new HP Wolf security report.
Developing a strong security posture across hybrid-cloud networks must be a continuous effort to fight ransomware.
When an African technology university was targeted by Malware as a Service, Darktrace AI helped identify the cyberattack in its early stages.
William MacMillan has joined Salesforce as SVP, Security Product and Program Management, BISO, and Acquisition Integration.
Experienced cybersecurity executive Samuel John Cure has been named Chief Information Security Officer (CISO) at AMI.
ThoughtLab's "Cybersecurity Solutions for a Riskier World" report outlines six best practices for enterprise cybersecurity leaders.
Network detection and response (NDR) solutions are the balance that security teams need to fight nation-state cybersecurity threats and zero-day attacks.
Chief Information Security Officer at DefenseStorm Bob Thibodeaux is focused on reframing cybersecurity as a business enabler.
Cybersecurity leaders in the U.S. public sector need to adapt to a permanently changed workforce, including a focus on cloud migration and security.
Online privacy has evolved greatly in the United States, and there is legislation on the horizon that may change data privacy and cybersecurity practices going forward.
The Better Cybercrime Metrics Act aims to improve how the federal government tracks, measures, analyzes and prosecutes cybercrime.
The "Security Program Management: Priorities and Strategies" study from Blue Lava and Aimpoint Group explores how security leaders measure and manage security programs and communicate priorities to executives and boards, highlighting the importance of security benchmarking.
Costa Rica declared a state of national cybersecurity emergency after a Conti ransomware attack crippled the country’s government and economy.
Effective crisis communications in the event of a cyberattack can support immediate security needs and mitigate long-term reputational damage.
On May 12, 2021, President Biden signed the Executive Order on Improving the Nation's Cybersecurity, catalyzing a shift in cybersecurity culture and initiatives across federal agencies and their vendors. A report from MeriTalk analyzed how the EO has affected U.S. cybersecurity.
IKEA Canada has suffered an internal data breach that impacted 95,000 Canadians.
Security leaders reflect on the Colonial Pipeline ransomware attack, lessons learned and best practices to protect against cybersecurity risks facing enterprises.
The 11th episode of the Cybersecurity and Geopolitical Podcast explores the current state of the Russian invasion of Ukraine. With May 9th being Russia's World War II "Victory Day" holiday, geopolitical experts expect more action.
AGCO (Your Agriculture Company) has suffered a ransomware attack, which has impacted some production facilities.
The Minnesota Cyber Security Conference is set to take place June 9, 2022 at the Minneapolis Marriott City Center, bringing together the region's cybersecurity community for education and networking.
In response to the Russian invasion of Ukraine, U.S. President Joe Biden released a statement on the state of cybersecurity in the nation. Cybersecurity leaders can follow many recommendations to improve security at their organizations.
Natascha Gerlach is the new Director of EU Privacy and Data Policy at The Centre for Information Policy Leadership (CIPL), where she will focus on a wide range of privacy and data policy-related topics.
The WWT Research: Security Priorities Report identified cybersecurity priorities for security teams navigating evolving technology landscapes and working environments.
Discover how enterprises are currently undertaking digital risk management and if they are actively managing digital risk in today's volatile environment.
The amount of money lost to business email compromise (BEC) scams continues to grow each year, according to the FBI.
In honor of World Password Day, security leaders have shared some best practices and tips on bolstering password defenses year-round.
The recently released SCS 9001 supply chain security standard offers an auditable and verifiable solution to help meet the goals of initiatives aimed at improving global cybersecurity.
David Lashway and John Woods, cybersecurity, national security and privacy lawyers, have joined Sidley Austin LLP as partners.
The 2022 Third Party Risk Management (TPRM) Industry Study from Prevalent, Inc. reveals a security focus on non-cyber third-party risks, such as corruption, unethical working conditions and more.
Enterprise security leaders in the travel and hospitality sectors can employ these fraud prevention and response techniques to mitigate fraud in their organizations and industries.
Winnti Group stole gigabytes of intellectual property and sensitive proprietary data from dozens of companies, according to Cybereason.
The United States and 60 other countries have signed the Declaration for the Future of the Internet to promote a global internet that advances the free flow of information and more.
Attila Török, Head of Security at Zapier, talks about the company culture and technologies needed to run a successful remote security team in the latest Security podcast episode.
The "Diversity in the Cyber Workforce: Addressing the Data Gap" whitepaper from MITRE explores why diversity benchmarking is important for the cybersecurity workforce and identifies associated challenges.
The increased development and deployment of cloud-native applications require more advanced security capabilities, Tigera's new report found.
K-12 students need to learn about cybersecurity along with their exposure to digital technology. The Sphero BOLT, a coding robot, can help teach students about cyber risk management, ethical hacking and more.
Cybersecurity professionals need to follow these four steps to mitigate the effects of ransomware: prevention, preparation, response and recovery.
Cybersecurity legislation from the European Union, the Digital Services Act, has wider implications for global online fraud and misinformation mitigation campaigns.
Formulating a before, during and after approach is key to organizational sanity and survival in a world increasingly dominated by ransomware attacks.
Cybersecurity professionals can submit comments on recent draft guidance on 5G cybersecurity from the National Institute of Standards and Technology (NIST).
“Reinventing Cybersecurity,” a collection of original stories by female and non-binary security professionals, highlights how positive change is fostered by reinventing approaches to security.
Jason Fickett is now a leader of Booz Allen’s national cyber strategy, where he will focus on protecting U.S. critical infrastructure federal assets from cyber threats.
The University of Central Florida is the champion of the 2022 National Collegiate Cyber Defense Competition.