UiPath partners with CrowdStrike to secure SaaS workflow automation

UiPath partners with CrowdStrike to secure SaaS workflow automation

UiPath is expanding its robotic process automation (RPA) platform with new features it hopes will put it on CIOs’ radar, including better security, a cloud-native delivery model, and the ability to automate through APIs as well as the UI. The security component comes through a partnership with CrowdStrike, while the API automation is the fruit of UiPath’s acquisition of Cloud Elements in March 2021. A recent survey by IDG Research found that many IT organizations…

Read More

Ransomware Intrusion Group FIN12 Ramps-Up in Europe

Ransomware Intrusion Group FIN12 Ramps-Up in Europe

A long-running threat group with a track record of rapid ransomware deployment and healthcare sector victims is ramping up its operations in Europe and APAC, Mandiant has warned. In a new report detailing the work of FIN12, the threat intelligence firm claimed that the prolific threat group had focused mainly on North American targets since its activities were first recorded in 2018. Around 85% were from this region, and 20% thus far have been healthcare sector organizations,…

Read More

Human error, psychology and specificity: The power of spear phishing

Human error, psychology and specificity: The power of spear phishing

Human error, psychology and specificity: The power of spear phishing This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Enhanced resumes for security job seekers

Enhanced resumes for security job seekers

Enhanced resumes for security job seekers This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message…

Read More

Should you stay or should you go?

Should you stay or should you go?

Should you stay or should you go? This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Emerging technology, evolving threats — Part III: 5G and the new surfaces and strategies

Emerging technology, evolving threats — Part III: 5G and the new surfaces and strategies

Emerging technology, evolving threats — Part III: 5G and the new surfaces and strategies This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Bringing value to security

Bringing value to security

Bringing value to security This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message or continuing…

Read More

SecTor Episode MMXXI: Return of The Hack Lab | The State of Security

SecTor Episode MMXXI: Return of The Hack Lab | The State of Security

I’m happy to announce that arrangements have now been finalized for the Tripwire team to return for the Tripwire VERT Hack Lab at the MTCC! We will be bringing some new hardware devices as well as a new virtualized hack target. This new virtual target, an ASUS DSL modem with recent firmware, can be compromised by applying the tools & methods we’ve taught in the classroom and in the Hack Lab since day 1. If…

Read More

The Changing Role of the CISO | The State of Security

The Changing Role of the CISO | The State of Security

Back in the early days of networking, many companies assigned all of the responsibilities to anyone who showed any aptitude towards operating a computer. In many companies, this was an accountant or someone else who also managed sensitive financial information. The assumption was that the person managing the corporate books was the most trustworthy person in the organization. This is perhaps true of finance, but as you can imagine, not only were the networks poorly managed, but…

Read More

Modern Times, Old Prejudices

Modern Times, Old Prejudices

The Hacker Era By Jordan Marcus Bonagura The century of constant acceleration Twenty-first century, more than a century of human evolution and great changes, a century of constant acceleration. Everything is always changing and exaggeratedly fast – technology, social changes and even our lifestyles. Changes so impactful that not even our most consolidated routines escaped, escape, or will escape impunity. Currently, we are bound to use technology in everything we do. If we stop to…

Read More
1 2,212 2,213 2,214 2,215 2,216 2,755