MoD Invites Innovators to Reduce Military’s Cyber-Attack Surface

MoD Invites Innovators to Reduce Military’s Cyber-Attack Surface

The UK’s Ministry of Defence (MoD) is calling on startups to help the military reduce its cyber-attack surface by designing a new generation of more secure hardware and software. The MoD’s Defence and Security Accelerator (DASA) issued the call-to-arms on Monday, claiming it is prepared to fund proposals up to £300,000 for a nine-month contract. “The Defence Science and Technical Laboratory (DSTL) on behalf of the MoD is interested in identifying and accelerating next generation hardware and software technologies…

Read More

Are We Past Peak Ransomware? | The State of Security

Are We Past Peak Ransomware? | The State of Security

In this episode, Greg Wilson, CISO of Docupace, discussed the rise of ransomware during uncertain times (i.e. COVID pandemic), whether it’s here to stay, and how to prevent damage with security hygiene. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 In the latest episode of the Tripwire Cybersecurity podcast, I had the opportunity to interview Greg Wilson, the Chief Information Security Officer at Docupace. Tim Erlin:  Welcome, Greg. Thanks for joining us.  Today, the topic that we’re going…

Read More

The Top 10 Highest Paying Jobs in Information Security – Part 1

The Top 10 Highest Paying Jobs in Information Security – Part 1

Want a job in cybersecurity? There are plenty to go around. Cybersecurity Ventures estimated that there will be 3.5 million job openings in the industry by the end of the year. That makes sense. According to Gartner, global spending on information security and risk management technology is expected to exceed $150 billion in 2021. Organizations are going to need someone to help them manage those new solutions. The issue is that information security is an…

Read More

Colonial Pipeline Reportedly Admits Data Breach

Colonial Pipeline Reportedly Admits Data Breach

Colonial Pipeline has reportedly admitted that nearly 6000 individuals may have had their personal information compromised by ransomware attackers when they struck earlier this year. The fuel pipeline operator, which was crippled by the attack in May, confirmed to CNN Business that it had begun sending out breach notification letters to 5810 victims. Most of those affected are thought to be current and former employees and family members. The compromised information is thought to include names,…

Read More

How much does phishing really cost the enterprise?

How much does phishing really cost the enterprise?

Dive Brief:  The financial impact of phishing attacks quadrupled over the past six years, with the average cost rising to $14.8 million per year for U.S. companies in 2021, compared with $3.8 million in 2015, according to a study from the Ponemon Institute on behalf of Proofpoint released Tuesday. Researchers surveyed 591 IT and IT security professionals. Companies spent almost $6 million per year on business email compromise (BEC) recovery, which includes about $1.17 million…

Read More

Cloud Misconfiguration Leaks US Terror Watchlist

Cloud Misconfiguration Leaks US Terror Watchlist

A secret watchlist of suspected terrorists maintained by the FBI was exposed online after a configuration error and then not fixed for several weeks after being reported, according to Comparitech. Head of security research at the firm, Bob Diachenko, said he discovered the Terrorist Screening Center (TSC) list on July 19, when the exposed Elasticsearch server was indexed by search engines Censys and ZoomEye. The list was left online without a password or any other authentication…

Read More

5 minutes with Dr. Tommy Gardner – How to accelerate U.S. supply chain and security innovation

5 minutes with Dr. Tommy Gardner – How to accelerate U.S. supply chain and security innovation

5 minutes with Dr. Tommy Gardner – How to accelerate U.S. supply chain and security innovation | 2021-08-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated…

Read More

Categorizing fraud types is the key to addressing risk

Categorizing fraud types is the key to addressing risk

Categorizing fraud types is the key to addressing risk | 2021-08-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Elevating governance, risk and compliance throughout the software development life cycle with digital risk management

Elevating governance, risk and compliance throughout the software development life cycle with digital risk management

Elevating governance, risk and compliance throughout the software development life cycle with digital risk management | 2021-08-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More
1 2,144 2,145 2,146 2,147 2,148 2,594