Expert: Biden’s executive order on cybersecurity is a good start toward protecting organizations

Expert: Biden’s executive order on cybersecurity is a good start toward protecting organizations

Cybersecurity expert says it all starts with process. The regulations will make it easier for companies to report breaches. TechRepublic’s Karen Roby spoke with Jennifer Bisceglie, CEO of Interos, about President Joe Biden’s executive order on cybersecurity. The following is an edited version of their conversation. SEE: Security incident response policy (TechRepublic Premium) Karen Roby: Go ahead and go over a couple of the main points of the president’s executive order. What really sticks out…

Read More

Alert Actionability In Plain English From a Practitioner | McAfee Blogs

Alert Actionability In Plain English From a Practitioner | McAfee Blogs

In response to the latest MITRE Engenuity ATT&CK® Evaluation 3, McAfee noted five capabilities that are must-haves for Sec Ops and displayed in the evaluation.  This blog will speak to the alert actionability capability which is essential. This critical ability to react in the fastest possible way, as early as possible on the attack chain, while correlating, aggregating and summarizing all subsequent activity while reducing alert fatigue to allow Sec Ops to uphold efficient actionability.   As a Sec Ops practitioner and former analyst, I can remember the days of painstakingly sifting through countless alerts to determine if any of them could be classified as an incident….

Read More

Anomali Cyber Watch: Bizzaro Trojan Expands to Europe, Fake Call Centers Help Spread BazarLoader Malware, Toshiba Business Reportedly Hit by DarkSide Ransomware and More

Anomali Cyber Watch: Bizzaro Trojan Expands to Europe, Fake Call Centers Help Spread BazarLoader Malware, Toshiba Business Reportedly Hit by DarkSide Ransomware and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: BazarCall, DarkSide, Data breach, Malware, Phishing, Ransomware and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber…

Read More

Shift left security is helpful, but one expert says it’s not enough

Shift left security is helpful, but one expert says it’s not enough

It’s critical to plug cybersecurity vulnerabilities before bad guys get wind of them. To make that happen, businesses should encourage security and developer teams to collaborate, says an expert. Image: iStockphoto/maxkabakov After-the-fact cybersecurity is something cybercriminals appreciate. “With attackers continuing to innovate ways they can compromise their victims’ assets, it’s becoming increasingly critical for organizations to reduce their attack surfaces,” said Rickard Carlsson, co-founder, and CEO of Detectify, a cybersecurity company utilizing ethical hackers. “To…

Read More

Conti ransomware attacks impact healthcare and first responder networks

Conti ransomware attacks impact healthcare and first responder networks

Conti ransomware attacks impact healthcare and first responder networks | 2021-05-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Securitas North America partners with National Center for Missing & Exploited Children to provide extra training

Securitas North America partners with National Center for Missing & Exploited Children to provide extra training

Securitas North America partners with National Center for Missing & Exploited Children to provide extra training | 2021-05-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated…

Read More

DockerCon 2021: Women in Tech Panel – Docker Blog

DockerCon 2021: Women in Tech Panel – Docker Blog

At Docker, we feel strongly about embracing diversity and we are committed to being proactive with respect to inclusion. As an example of our support for diversity, we are hosting the Community Rooms during DockerCon with panels and sessions for our global audience in their native languages. We are also highlighting the contributions from our women Captains and community developers. At DockerCon, the Women in Tech panel will focus on the breadth and depth of…

Read More

Three-Quarters of CISOs Predict Another SolarWinds-Style Attack

Three-Quarters of CISOs Predict Another SolarWinds-Style Attack

Some 84% of global organizations have suffered a serious security incident over the past two years and a majority are expecting another SolarWinds-style supply chain attack, according to a new Splunk report. The IT data platform provider interviewed 535 security leaders in nine leading economies across multiple industries, to compile its latest report, The State of Security 2021. Of those that were successfully attacked, email compromise (42%) was the most common incident, followed by data…

Read More

Average losses from compromised cloud accounts: $500,000 plus a year

Average losses from compromised cloud accounts: 0,000 plus a year

Average total annual financial loss for companies from compromised cloud accounts is more than $500,000, according to new research.  (Sean Gallup/Getty Images) Average total annual financial loss for companies from compromised cloud accounts is more than $500,000, according to new research.  The findings came from a survey of 600 IT and security professionals in the U.S. jointly produced by Proofpoint and the Ponemon Institute. The report also noted that 68% of respondents believe cloud account…

Read More
1 2,260 2,261 2,262 2,263 2,264 2,581