Navigating the identity security landscape

Navigating the identity security landscape

In this episode of The Security Podcasts featuring Jeff Reich, Executive Director of the Identity Defined Security Alliance, we discuss the challenges security professionals are facing in the evolving landscape of identity security threats. “Something we see often is when we were asking the question, ‘how long do account stay active or in your system after someone leaves your organization?’ And certainly there are a number of organizations that say within two days it’s been…

Read More

Keep Your Data Safe and Become More Productive for Just $30

Keep Your Data Safe and Become More Productive for Just $30

It’s great that Windows comes free with your computer, and free upgrades are available as well. But they tend to be the basic versions, and if you’ve got business to take care of, you’ll probably appreciate the ways Microsoft Windows 10 Pro can increase productivity by allowing you to work smarter and so much more efficiently. Best of all, you can get Microsoft Windows 10 Pro for just $29.97 during a special week sale at…

Read More

Top 40 Cybersecurity Companies You Need to Know 2024

Top 40 Cybersecurity Companies You Need to Know 2024

eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. As the demand for robust security defense grows, the market for cybersecurity technology has exploded, as have the number of available solutions. To help you navigate this growing market, we recommend 20 of the world’s leading cybersecurity technology providers and another 20 honorable mentions, based on their innovation, revenue and growth, user…

Read More

The return of a malware menace.

The return of a malware menace.

This week we are joined by, Selena Larson from Proofpoint, who is discussing their research, “Bumblebee Buzzes Back in Black.” Bumblebee is a sophisticated downloader used by multiple cybercriminal threat actors and was a favored payload from its first appearance in March 2022 through October 2023 before disappearing. After a four month hiatus, Proofpoint researchers found that the downloader returned. Its return aligns with a surge of cybercriminal threat activity after a notable absence of…

Read More

New Vulnerabilities in ConnectWise ScreenConnect Massively Exploited by Attackers

New Vulnerabilities in ConnectWise ScreenConnect Massively Exploited by Attackers

Two new vulnerabilities impact ConnectWise ScreenConnect, remote desktop and access software used for support: CVE-2024-1709 and CVE-2024-1708, with the former being particularly dangerous for organizations. The CVE-2024-1709 vulnerability, which affects ScreenConnect 23.9.7 and prior, allows any remote attacker to bypass authentication to delete the ScreenConnect user database and get control of an admin user. Massive exploitation by attackers is ongoing in the wild, with more than 3,000 vulnerable instances reachable from the internet. Security companies…

Read More

Google Cloud's Nick Godfrey Talks Security, Budget and AI for CISOs

Google Cloud's Nick Godfrey Talks Security, Budget and AI for CISOs

Image: Adobe/Sundry Photography As senior director and global head of the office of the chief information security officer (CISO) at Google Cloud, Nick Godfrey oversees educating employees on cybersecurity as well as handling threat detection and mitigation. We conducted an interview with Godfrey via video call about how CISOs and other tech-focused business leaders can allocate their finite resources, getting buy-in on security from other stakeholders, and the new challenges and opportunities introduced by generative…

Read More

Ransomware's Impact May Include Heart Attacks, Strokes & PTSD

Ransomware's Impact May Include Heart Attacks, Strokes & PTSD

Ransomware incidents cause significant harm at many levels, including to physical and mental health; new research from U.K. security think tank Royal United Services Institute has classified this impact into three categories (Figure A): First-order harms: The harms to organizations and their staff. Examples include data loss, reputational harm and heart attacks. Second-order harms: The indirect harms to organizations and individuals. Examples include clients and customers in supply chains might be targeted, and patients’ cancer…

Read More

UK Study: Generative AI May Increase Ransomware Threat

UK Study: Generative AI May Increase Ransomware Threat

The U.K.’s National Cyber Security Centre has released a new study that finds generative AI may increase risks from cyber threats such as ransomware. Overall, the report found that generative AI will provide “capability uplift” to existing threats as opposed to being a source of brand new threats. Threat actors will need to be sophisticated enough to gain access to “quality training data, significant expertise (in both AI and cyber), and resources” before they can…

Read More

Get Elite Protection from Malware with Award Winning Antivirus – Now $25

Get Elite Protection from Malware with Award Winning Antivirus – Now $25

Image: StackCommerce TL;DR: Protect your computer from common viruses and other forms of malware, including ransomware and rootkits, with the ESET NOD32 Antivirus 2024 Edition, on sale for just $24.99 through January 14. Cybercrime has long been a problem for businesses. Now that hackers have access to AI and machine learning tech, however, security analysts expect the growth rate to climb exponentially. Are your company’s computers adequately protected for the new year? If not, then…

Read More
1 2 3 4 38