German MPs Hit by Russian-Backed Phishing Attacks

German MPs Hit by Russian-Backed Phishing Attacks

German lawmakers have been targeted once again by phishing attacks reportedly linked to Russian intelligence services. Local reports claimed yesterday that seven members of the Bundestag and 31 members of the state parliament had their inboxes compromised, although these appear to have been personal rather than official accounts. The phishing emails were spoofed to appear as if urgent messages sent by providers GMX and T-Online. The politicians belong to governing parties the CDU/CSU and SPD….

Read More

The Best Network Protection: Go Deep or Go Broad?

The Best Network Protection: Go Deep or Go Broad?

By Albert Zhichun Li, Chief Scientist, Stellar Cyber Almost since the beginning of network security, vendors and practitioners have wrestled with choices between going deep and going broad for their security solutions. Mostly, the choice varies between predominantly one or the other. Going deep typically means careful monitoring and analysis of certain types of threats or behaviors at the cost of not examining a much broader range of activity. Solutions that are broader may lack…

Read More

Peer-To-Peer Cybersecurity Insights For 2021

Peer-To-Peer Cybersecurity Insights For 2021

Based on real practitioners’ experiences By Stuart Berman, IT Central Station Super User December is typically a month when people who work in the IT field offer predictions for the coming year. 2020 has been a highly atypical year, however, so it’s a bit daunting to think about what’s coming over the horizon. Yet, my company is in a unique position to engage in prognostication. We source user data directly from users in the trenches….

Read More

5 minutes with Tony Howlett – Vendor risk management needs to be a top security priority in 2021 and beyond

5 minutes with Tony Howlett – Vendor risk management needs to be a top security priority in 2021 and beyond

5 minutes with Tony Howlett – Vendor risk management needs to be a top security priority for organizations in 2021 and beyond | 2021-03-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the…

Read More

Cybersecurity risk – increased by the pandemic – redefines the workplace

Cybersecurity risk – increased by the pandemic – redefines the workplace

Cybersecurity risk – increased by the pandemic – redefines the workplace | 2021-03-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

The evolving role of user experience in security

The evolving role of user experience in security

The evolving role of user experience in security | 2021-03-27 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

The impact of COVID-19 on emergency communications

The impact of COVID-19 on emergency communications

The impact of COVID-19 on emergency communications | 2021-03-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

NIST SP 800-172 release couldn’t come at a better time

NIST SP 800-172 release couldn’t come at a better time

NIST’s timely new release of Special Publication (SP) 800-172 (formerly referred to in draft form as 800-171B) provides exactly what its title says, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST SP 800-171. Yet it goes a step further to protect controlled unclassified information (CUI) specifically from APTs. According to Scott Goodwin, IT audit and security supervisor with OCD Tech and Tripwire guest blog contributor, the latest NIST guidance “…introduces 33…

Read More

SOCs to Turn to Security Automation to Cope with Growing Threats

SOCs to Turn to Security Automation to Cope with Growing Threats

Increasingly complex threats, staffing shortages, and rising costs are driving investments in security automation By Chris Triolo, Vice President of Customer Success, FireEye The cybersecurity landscape is becoming ever more complex as the number and sophistication of threats continue to rise across all channels and industries. Ransomware, phishing, supply chain attacks and other threats have all grown dramatically over the past year. The FBI reported that complaints made to its Internet Crime Complaint Center (IC3)…

Read More

Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East

Innovation, Automation and Securing A “Work from Anywhere” Environment In The Middle East

By Mazen A. Dohaji, Vice President, India, Middle East, Turkey & Africa (iMETA), LogRhythm. Throughout 2020, enterprises and public sector organizations across the Middle East have been managing disruption and finding new ways to work. The challenge as we begin 2021 is to not just survive but thrive in this new business environment. That requires adopting new tools and creating a secure foundation that keeps users connected and moving forward. While many organizations have experienced…

Read More
1 3,686 3,687 3,688 3,689 3,690 3,760