Lessons from the SolarWinds attack on securing the software supply chain

Lessons from the SolarWinds attack on securing the software supply chain

CSO Online | May 19, 2021 The SolarWinds breach represents a tectonic shift in threat actor tactics, suggesting this kind of attack vector will be replicated. Not only were the attacker’s sophistication and technical proficiency high — allowing them to stay in stealth mode — they also understood the supply chain. Join us to learn how improved identity management and governance surrounding software components, along with workload runtime protection, are critical strategies in guarding against…

Read More

5 minutes with Ben Johnson – SaaS apps security issues

5 minutes with Ben Johnson – SaaS apps security issues

5 minutes with Ben Johnson – SaaS apps security issues | 2021-05-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Protecting the enterprise against state-sponsored attacks

Protecting the enterprise against state-sponsored attacks

Protecting the enterprise against state-sponsored attacks | 2021-05-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Moving to measure a cyber-aware culture

Moving to measure a cyber-aware culture

Moving to measure a cyber-aware culture | 2021-05-19 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Google’s Office of the CISO points the way towards scaling security

Google’s Office of the CISO points the way towards scaling security

Amazon’s, Google’s and Microsoft’s experiences with building massive infrastructures for the world allows for some fascinating insights into the future of IT security at scale. As a result, when Google published The CISO’s Guide to Cloud Security Transformation earlier this year, I was curious about what priorities they saw in cloud security. It’s a short read, and it’s well worth the time invested in downloading a copy.  I want to share my observations on some…

Read More

#RSAC: Solving the Ransomware Scourge Requires a Coordinated Effort

#RSAC: Solving the Ransomware Scourge Requires a Coordinated Effort

The scourge that is ransomware has had a devastating impact on the lives of ordinary people around the world, but it doesn’t have to be that way, according to a panel of experts speaking at the 2021 RSA Conference on May 18. Ransomware is not a new problem in 2021, and it certainly is not one that appears to be diminishing by any measure; rather, it’s growing. Jen Miller-Osborn, deputy director of threat intelligence for Unit…

Read More

Request for Comments: P2PE v3.1 Draft Standard

Request for Comments: P2PE v3.1 Draft Standard

  P2PE Assessors and Participating Organizations are invited to provide feedback on the draft P2PE v3.1 Standard minor revision during a 30-day request for comments (RFC) period running from 18 May through 17 June 2021. This minor revision primarily includes updates to Domain 5 to align with the updates, as applicable, from the PCI PIN v3.1 Standard minor revision published in March 2021. Additional errata updates are also included.

Read More

Google I/O 2021: Everything Google is announcing at this year’s virtual keynote right now

Google I/O 2021: Everything Google is announcing at this year’s virtual keynote right now

At the first-ever virtual Google I/O, Alphabet Chief Executive Officer Sundar Pichai talked about news on Workspace, quantum computing and privacy needs. Google announced new video collaboration features as part of Smart Canvas, a new set of capabilities that is part of Workspace. The keynote for Google I/O was live streamed from Google’s headquarters in Mountain View, California on Tuesday, and Google executives touched on everything from new collaboration features in Workspace, to quantum computing,…

Read More

#RSAC: Does the US Need a National Breach Reporting Law?

#RSAC: Does the US Need a National Breach Reporting Law?

When a security breach occurs in the US today there is no single authority or national breach reporting law that needs to be adhered to, but that could change in the near future, according to a panel of experts speaking at the 2021 RSA Conference on May 18. Luke Dembosky, partner at law firm Debevoise & Plimpton LLP, commented that the current state of breach reporting in the US is a patchwork of laws and policies that vary…

Read More

Anomali Cyber Watch: Microsoft Azure Vulnerability Discovered, MSBuild Used to Deliver Malware, Esclation of Avaddon Ransomware and More

Anomali Cyber Watch: Microsoft Azure Vulnerability Discovered, MSBuild Used to Deliver Malware, Esclation of Avaddon Ransomware and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, Android, Malware, Ransomware, and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber News and Threat…

Read More
1 3,373 3,374 3,375 3,376 3,377 3,573