Identity Protection Service: The Best Solution to a Growing Problem

Identity Protection Service: The Best Solution to a Growing Problem

I’m about to tell you an extraordinary fact about cybercrime. Some of the most significant data breaches in internet history weren’t after bank account numbers, cryptocurrency, or even credit card numbers. They were, in fact, after YOU. That’s right, the most valuable data on the internet is the data that comprises your identity. Let’s take a look at what that data is, how it gets leveraged by cybercriminals, and how you can get the online identity protection you…

Read More

Attacks on UK Businesses Fall for First Time in Three Years

Attacks on UK Businesses Fall for First Time in Three Years

Recorded cyber-attacks against UK businesses have fallen for the first time since 2018, although hybrid working practices represent an ongoing risk, according to new data from Beaming. The business ISP has been analyzing malicious traffic targeting its customers since 2016, in order to better understand the threat landscape. It claimed that threat volumes dropped by 9% year-on-year in the second quarter of 2021, bringing them down to levels similar to Q1 2021 when businesses suffered just over…

Read More

How to write an ISO 27001 access control policy – free template

How to write an ISO 27001 access control policy – free template

Access control policies are an unquestionably important part of ISO 27001. The requirements for producing one are outlined in section A.9 of Annex A, which contains 14 controls. In this blog, we explain what Annex A.9 covers and what your access control should include. What is Annex A.9 of ISO 27001? Annex A.9 of ISO 27001 helps you govern who has access to your organisation’s sensitive information and under what scenarios. This helps secure your…

Read More

App Stores Remove Ride-Hailing Giant Didi Chuxing

App Stores Remove Ride-Hailing Giant Didi Chuxing

One of the world’s biggest ride-hailing services has had its app removed from the web by the Chinese authorities over privacy concerns. Regulator the Cyberspace Administration of China (CAC) ordered the country’s app store providers to remove Didi Chuxing from their platforms over the weekend. “After checks and verification, the Didi Chuxing app was found to be in serious violation of regulations in its collection and use of personal information,” the CAC reportedly said. In response, the firm…

Read More

US Spy Agencies to Investigate Kaseya Supply Chain Attack

US Spy Agencies to Investigate Kaseya Supply Chain Attack

President Biden has ordered his intelligence agencies to investigate a major ransomware supply chain attack over the weekend that targeted a vendor of IT software used by managed service providers (MSPs). Suspected to be the work of a REvil affiliate, the attack on Miami-headquartered Kaseya was spotted by its incident response team at around midday on Friday. The firm’s latest update, dated Sunday, claimed that the incident had affected around 40 on-premises customers worldwide, who will need a patch to…

Read More

The Aviation Industry Needs to Move Towards Cyber Resilience

The Aviation Industry Needs to Move Towards Cyber Resilience

2021 is a significant year for aviation. It marks the 20th anniversary of the 9/11 attacks, the worst acts of unlawful interference in the history of aviation. It is also the Year of Security Culture for the ICAO community, which aims to enhance security awareness and foster a security culture throughout the industry. The importance of understanding the threat to aviation and promoting best practices in security throughout all aviation operations is imperative considering that…

Read More

Top 5 security threats for power plants and how to proactively avoid them

Top 5 security threats for power plants and how to proactively avoid them

Top 5 security threats for power plants and how to proactively avoid them | 2021-07-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

CASB, CWPP, CSPM, and CNAPP: Which one is right for securing your cloud environment?

CASB, CWPP, CSPM, and CNAPP: Which one is right for securing your cloud environment?

CASB, CWPP, CSPM, and CNAPP: Which one is right for securing your cloud environment? | 2021-07-05 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Discovering Unknown Botnets with Command-and-Control Communications Analysis

Discovering Unknown Botnets with Command-and-Control Communications Analysis

Byline: Howie Xu Cloud-edge-based proxy security services like the Zscaler Zero Trust Exchange rely on Machine Learning models to detect, identify, and block malicious traffic. Zscaler (my employer) processes more than 160 billion data transactions per day, the vast majority of which are quickly recognized as benign. But it’s the minority of remaining traffic (still a huge volume) that demands further analysis: How do we ensure nothing bad gets through? Detection starts with domain analysis…

Read More

You don’t have to be a tech expert to become a cybersecurity pro

You don’t have to be a tech expert to become a cybersecurity pro

Attention to detail, creativity and perseverance are key traits for a good white hat hacker. These positions are in high demand. TechRepublic’s Karen Roby spoke to Ning Wang, CEO of Offensive Security, about what it takes to become a cybersecurity professional. The following is an edited transcript of their conversation. Karen Roby: Ning, let’s just start with the state of cybersecurity; where we are in terms of the number of professionals to fill these roles…

Read More
1 2,347 2,348 2,349 2,350 2,351 2,734