Cybersecurity career training for the real world

Cybersecurity career training for the real world

Riccardo Nobili’s passion for cybersecurity career training is palpable. Not only is Nobili the Head of Network at Leroy Merlin, a global home improvement and gardening retailer, but he is also a Cisco Networking Academy instructor where he enables students to become future cybersecurity defenders. If you’re also passionate about cybersecurity, check out our open opportunities. Scalable: Networks and student growth As the Head of Network at Leroy Merlin, Nobili is accountable for all parts…

Read More

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Proofpoint Exposes Sophisticated Social Engineering Attack on Recruiters That Infects Their Computers With Malware

Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat. A new report from U.S.-based cybersecurity company Proofpoint exposes a new attack campaign operated by a financially-oriented threat actor dubbed TA4557 with high financial data theft risks and possibly more risks such as intellectual property theft. In this social engineering campaign, the threat actor targets recruiters with benign content before infecting their machines with the More_Eggs malware. This…

Read More

Securities and Exchange Commission Cyber Disclosure Rules: How to Prepare for December Deadlines

Securities and Exchange Commission Cyber Disclosure Rules: How to Prepare for December Deadlines

Starting Dec. 18, publicly traded companies will need to report material cyber threats to the SEC. Deloitte offers business leaders tips on how to prepare for these new SEC rules. The U.S. Securities and Exchange Commission’s new rules around disclosure of cybersecurity incidents go into effect on Dec. 15 for public companies with fiscal years starting on or after that date. Publicly traded companies must annually report their processes for spotting, judging and mitigating cybersecurity…

Read More

Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware

The Cisco Talos Year in Review report released Tuesday highlights new trends in the cybersecurity threat landscape. We’ll focus on three topics covered: the ransomware cybercriminal ecosystem, network infrastructure attacks and commodity loader malware. More ransomware actors switched to extortion rather than encryption, while commodity loaders evolved to be stealthier and highly effective, although new major security improvements have seen the day in 2023, such as Microsoft Office disabling macros by default. Network devices are…

Read More

Google Workspace Marketplace: 4 Tips for Choosing the Best Apps

Google Workspace Marketplace: 4 Tips for Choosing the Best Apps

An Independent Security Verification badge is one indication that an app should go to the top of your list when evaluating options in the Google Workspace Marketplace. If you’re a Google Workspace administrator or user selecting an application from the Google Workspace Marketplace, your first task is to make sure an application does the job you want completed as easily as possible. Beyond that, you might use the following four indicators from a Google Workspace…

Read More

IT Professionals in ASEAN Confronting Rising Cyber Security Risks

IT Professionals in ASEAN Confronting Rising Cyber Security Risks

In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre of Excellence, in a bid to increase the region’s shared cyber threat defences. The centre is a response to a changing threat landscape. At the opening of the ACICE, Singapore’s Ministry of Defence said Singapore alone experienced a 174% increase in phishing attempts between 2021 and 2022, while Southeast Asia…

Read More

Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Hunters researchers noted the vulnerability could lead to privilege escalation. Google said the report “does not identify an underlying security issue in our products.” Cybersecurity researchers from the firm Hunters discovered a vulnerability in Google Workspace that could allow unwanted access to Workspace APIs. The flaw is significant in that it could let attackers use privilege escalation to gain access that would otherwise only be available to users with Super Admin access. Hunters named this…

Read More

New AI Security Guidelines Published by NCSC, CISA & More International Agencies

New AI Security Guidelines Published by NCSC, CISA & More International Agencies

The U.K.’s National Cyber Security Centre, the U.S.’s Cybersecurity and Infrastructure Security Agency and international agencies from 16 other countries have released new guidelines on the security of artificial intelligence systems. The Guidelines for Secure AI System Development are designed to guide developers in particular through the design, development, deployment and operation of AI systems and ensure that security remains a core component throughout their life cycle. However, other stakeholders in AI projects should find…

Read More

Challenges, Trends and Opportunities for Healthcare Cybersecurity Leaders

Challenges, Trends and Opportunities for Healthcare Cybersecurity Leaders

When managing cybersecurity risk, healthcare has always had higher stakes. When a healthcare organization experiences a cyber attack, it’s about more than just money or reputation – it can be life or death in terms of patient care and treatment.   For this reason, I’m passionate about helping healthcare cybersecurity leaders to address their greatest security challenges and capitalize on emerging trends and opportunities in the security space.   I was thrilled to sit down with the…

Read More

Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

Australian SMBs Feel the Cyber Security Heat: Here’s What IT Pros Can Do to Help

60% of Australian small businesses don’t survive a cyber breach. What can the overworked IT pros in small businesses do with limited budgets against the cyber crime wave? The internet is a difficult space for Australian small and midsize businesses at the moment. Not only does the rate of innovation challenge them to adopt disruptive new technologies with minimal resources, but they also have to contend with the same cyber threats as all other businesses….

Read More
1 16 17 18 19 20 25