Recapping RSAC 2021: Cisco’s Keynote, Zero Trust Deployment & Passwordless Authentication

Recapping RSAC 2021: Cisco’s Keynote, Zero Trust Deployment & Passwordless Authentication

It was a packed virtual RSA Conference this year. Although I missed being in San Francisco’s Moscone center, visiting booths and chatting with industry peers, the virtual experience did have one key benefit in my opinion – the on-demand replays of the sessions. I was able to watch all the sessions that I wanted to without having to rush across the floors of the Moscone center. Resilience was the key theme this year at RSAC…

Read More

Dealing with stress, burnout and mental health – Cisco Blogs

Dealing with stress, burnout and mental health – Cisco Blogs

In the latest episode of the Security Stories podcast, we welcome three leaders from Cisco Talos for a discussion on mental health, stress and burnout. Check it out on your podcast platform of choice, available via the Security Stories webpage.  Joining myself, Ben Nahoney and Sana Yousef, are Matt Watchinski, Vice President of Talos, Matt Olney, Talos’ Head of Threat Intelligence and Interdiction, and Mitch Neff, who leads Talos’ communication strategy and hosts the Beers with…

Read More

Vaccines to Vaccinations: Towards collaboration in vaccine administration – Cisco Blogs

Vaccines to Vaccinations: Towards collaboration in vaccine administration – Cisco Blogs

Co-Author: Dr. Brad Crammond, Lead – Research & Insight, RMIT-Cisco Health Transformation Lab At the beginning of 2020, as the world was only just learning of the existence of COVID-19, there existed no vaccine for anything that looked anything like a coronavirus. However close humanity had come to such a vaccine during the SARS outbreak in 2001, efforts had been shelved when traditional infectious disease control measures were sufficient to stop the disease spreading. Barely 12 months…

Read More

Global CISOs Are Undermining Cyber-Hygiene Efforts

Global CISOs Are Undermining Cyber-Hygiene Efforts

Global cybersecurity leaders may not be practicing what they preach after new research revealed that many are engaging in risky behavior online. Constella Intelligence polled over 100 global IT security bosses across multiple verticals to compile its latest report, Cyber Risk in Today’s Hyperconnected World. It revealed widespread poor security practice: a quarter (24%) admitted to using the same passwords across work and personal use and nearly half (45%) connect to public Wi-Fi without using…

Read More

Global Credential Stuffing Hit 193 Billion Attempts in 2020

Global Credential Stuffing Hit 193 Billion Attempts in 2020

There were 193 billion credential stuffing attempts during 2020 as cyber-criminals looked to capitalize on surging numbers of online users, according to Akamai. The security vendor’s latest 2021 State of the Internet / Security report revealed the sheer scale of attempts to crack open users’ accounts using previously breached credentials. Focusing mainly on the financial sector, the report claimed that Akamai detected 3.4 billion credential stuffing attempts targeting the vertical — a 45% increase on…

Read More

Cloud misconfiguration exposes 100M+ Android Users

Cloud misconfiguration exposes 100M+ Android Users

Misconfiguration of back-end cloud services by more than 20 mobile app developers may have exposed the personal data of over 100 million Android users, according to researchers. A team at Check Point investigated 23 Android applications in a new piece of research, and found users’ emails, chat messages, location, passwords and photos all exposed by poor security practices. There were three main issues. First, misconfiguration of the real-time databases that developers use to store data…

Read More

5 steps to integrating security into the app development process (without disrupting CI/CD workflows)

5 steps to integrating security into the app development process (without disrupting CI/CD workflows)

5 steps to integrating security into the app development process (without disrupting CI/CD workflows) | 2021-05-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

5 minutes with Todd Waskelis – Cybersecurity consulting during the pandemic

5 minutes with Todd Waskelis – Cybersecurity consulting during the pandemic

5 minutes with Todd Waskelis – Cybersecurity consulting during the pandemic | 2021-05-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

5 Things to Do with MITRE ATT&CK – Tips and Tricks Special

5 Things to Do with MITRE ATT&CK – Tips and Tricks Special

MITRE ATT&CK stands for MITRE Adversarial Tactics, Techniques and Common Knowledge. It’s a curated knowledge base of adversarial behavior based on real-world observation of APT campaigns. The original impetus for the project was to answer the question, “How are we doing at detecting documented adversary behavior?” MITRE ATT&CK v1 was released in 2015, and since then, it has seen rapid growth and adoption across multiple domains such as risk management, threat intelligence, incident response and…

Read More
1 3,788 3,789 3,790 3,791 3,792 4,265