Protecting a New Vulnerable Population on the Internet

Protecting a New Vulnerable Population on the Internet

On a Mission of Protecting Abraham Lincoln is credited with saying that “A lawyer’s time and advice are his stock and trade.” Whether the quote is mis-attributed to Lincoln is irrelevant to the greater message, which is that attorneys are “knowledge workers.” To state it as bluntly as one attorney once explained to an executive where I worked, “My knowledge will keep you out of jail.” As a cybersecurity professional, you too are a knowledge…

Read More

Addressing the Growing Cybersecurity Risks of Cyber-Physical Systems

Addressing the Growing Cybersecurity Risks of Cyber-Physical Systems

By Michael Welch, Managing Director, MorganFranklin Cyber Cyberattacks against critical infrastructure and other cyber-physical systems have increased for years. These attacks are particularly concerning because they pose a real threat to peoples’ lives, health, and safety. As the Internet of Things (IoT) continues to expand, society also becomes increasingly dependent on cyber-physical systems. Properly securing these systems is essential to managing the risks that they pose to owners, managers, and the general community. Cyber-Physical Attacks…

Read More

Revenge of the SaaS: Mandiant uses services to escape FireEye

Revenge of the SaaS: Mandiant uses services to escape FireEye

Mandiant has untangled itself from FireEye (FEYE) by selling the product portion of the firm to Symphony Technology Group (STG) for $1.2 billion. FireEye’s history as the most “almost acquired vendor” is finally over as STG takes the reins. Image: putilich/Getty Images/iStockphoto In a cybersecurity divorce that had fewer leading indicators than the dissolution of Kim and Kanye, Mandiant has finally untangled itself from FireEye (FEYE) by selling the product portion of the firm to…

Read More

Expel rolls out managed detection and response for Microsoft

Expel rolls out managed detection and response for Microsoft

Expel for Microsoft alerts and responds to the Microsoft-specific vulnerabilities attackers typically exploit. Image: iStockphoto/Igor Kutyaev On Thursday, managed detection and response provider Expel announced the launch of its Expel for Microsoft offering, which automatically analyzes and prioritizes alerts across a suite of Microsoft products including Active Directory, AD Identity Protection, Azure, Microsoft Cloud App Security, Microsoft Defender for Endpoint, Office 365 and Sentinel.  Expel APIs ingests security signals from Microsoft’s products along with any…

Read More

US to Treat Ransomware Like Terrorism

US to Treat Ransomware Like Terrorism

A senior official at the United States Department of Justice (DOJ) has said that ransomware attacks in America are to be investigated with a similar urgency as incidences of terrorism. The official told news agency Reuters that cyber-assaults using this particular type of malware are to be prioritized more highly now following a passel of ransomware attacks against entities in the US and elsewhere. Ransomware victims in recent weeks have included the Colonial Pipeline, meat supplier JBS, the Steamship…

Read More

More US Kids Warned About Internet Than Unsafe Sex

More US Kids Warned About Internet Than Unsafe Sex

More American parents are warning their children about the dangers of going online than about the importance of sexual safety, according to new research. A survey of over 1,000 parents in the United States conducted by InMyArea.com found that 89% of parents with children aged 12 or older have had an intentional talk about internet safety with their children. By contrast, only 66% of American parents with kids aged 12 or older had purposefully discussed sexual safety with their…

Read More

Ransomware: A cheat sheet for professionals

Ransomware: A cheat sheet for professionals

This guide covers the Colonial Pipeline attack, WannaCry, Petya and other ransomware attacks, the systems hackers target and how to avoid becoming a victim and paying cybercriminals a ransom in the event of an infection. In the past, security threats typically involved scraping information from systems that attackers could use for other crimes such as identity theft. Now, cybercriminals have proceeded to directly demanding money from victims by holding their devices–and data–hostage. This type of…

Read More

Biden Expands Trump’s Investment Ban on Chinese Firms

Biden Expands Trump’s Investment Ban on Chinese Firms

President Joe Biden’s latest executive order has expanded a ban on investing in Chinese companies with alleged links to defense or surveillance technology sectors that was introduced by former president Donald Trump. The Trump administration issued an executive order on November 12, 2020, barring US entities from investing in a clutch of PRC companies including smartphone-maker Huawei, China Telecommunications Corp., China Unicom Ltd., and China Mobile Communications Group Co. On Thursday, Biden signed an order blocking Americans from investing…

Read More

CISOs Agree That Traditional Application Security Measures Don’t Work

CISOs Agree That Traditional Application Security Measures Don’t Work

Nearly three-quarters (71%) of CISOs aren’t confident that code in cloud-native architectures is free of vulnerabilities before it goes into production, according to new research from Dynatrace. The software intelligence firm polled 700 global security chiefs in large enterprises with over 1,000 employees to better understand their concerns over microservices, containers, and Kubernetes in development. Some 89% claimed their use had created dangerous application security blind spots. These challenges appear to be compounded by time-to-market…

Read More

White House asks private sector to take ransomware attacks more seriously

White House asks private sector to take ransomware attacks more seriously

White House asks private sector to take ransomware attacks more seriously | 2021-06-04 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More
1 2,241 2,242 2,243 2,244 2,245 2,581