Cyber Security
The Five Biggest Cybersecurity Trends in 2022 (Forbes)
Homeworking, the ongoing digitization of society, and the increasingly online nature of our lives mean opportunities about for phishers, hackers, scammers, and extortionists. There... More
Palo Alto Networks Appoints Helmut Reisinger to Leadership Team
Palo Alto Networks announced the appointment of Helmut Reisinger to the position of CEO for Europe, the Middle East and Africa (EMEA) and Latin America (LATAM). (more…)... More
CISOs Plan What to Buy With Funds From the Infrastructure Bill (Dark Reading)
CISOs welcome the cybersecurity funding allocated under the Infrastructure Investment and Jobs Act, but say it’s not perfect because it doesn't address a key issue: people.... More
Why the CISO Role is Evolving (CD)
CISOs are too focused on security operations, writing policies or vendor management, and less involved in business strategy, where their time is better spent.... More
The Matrix is the Best Hacker Movie (Wired)
Most people point to Sneakers, Hackers, or WarGames. They’re all wrong. The Wachowskis actually invented the ultimate cyber superhero.... More
The Future of Cyberattacks (ReadWrite)
Cyberthreats are growing in both scale and complexity, and the need to secure critical infrastructure by businesses and public organizations has never been as urgent as now.... More
One-Time Password Security Might Fail 80% of the Time – IAM is Better (Security Intelligence)
This type of password security is certainly better than traditional, static passwords. But recently security analysts discovered that you can buy an OTP interception service at you... More
Splunk for OT Security: Perimeter and Vulnerability Evolution
Owners and operators of Operational Technology environments are being increasingly tasked with providing more information and security controls for their OT Environments, whether t... More
Jim Cramer Talks With Palo Alto CEO Nikesh Arora (The Street)
Arora told Cramer that executives of companies have had to learn quickly about cybersecurity, as the problem has increased rapidly in magnitude. He predicted that 30-50 percent of ... More
Everyone is Burned Out – That’s Becoming a Security Nightmare (ZDNet)
Two years into the pandemic and the challenges around remote working are taking their toll. We're making bad tech security decisions as a result.... More
Online Criminals Have Created Their Pseudo Court System on the Dark Web (Fortune)
Online fraudsters have created an underground court system for settling disputes involving failed payments, product problems, and misrepresentation of services, according to a stud... More
Palo Alto Networks: Average Ransom Payment for Canadian Organizations More Than C$450K
Of the Canadian businesses hit by ransomware, a majority (58%) of IT decision-makers say their organization paid a ransom, with 14% saying their organization paid more than once. (... More
The Rise and Rise of Bug Bounty Hunting (Tech Monitor)
How an army of freelance white hat hackers are disrupting cybersecurity across the web.... More
Understanding the Adversary: How Ransomware Attacks Happen (Security Intelligence)
IBM Security X-Force Incident Response has responded to hundreds of ransomware incidents across every geography and industry. As we have taken time to analyze these incidents, a cl... More
7 Ways an Incident Response Retainer Can Increase Security Resilience (Palo Alto Networks Blog)
The number of cybersecurity incidents has increased amid the shift to remote work. Just in the past year, as many as 18,000 customers of SolarWinds unknowingly let in attackers thr... More
Crypto Becoming the Preferred Currency of Cybercriminals and Rogue Governments (CD)
The growth of cryptocurrency in cybercrime has coincided with the rise in ransomware. Nation-state cyber activity has become more brazen and sophisticated, threatening government a... More
Kudelski Security Enriches MDR Services With Integration of Microsoft Defender for Endpoint
Kudelski Security, the cybersecurity division within the Kudelski Group, announced the integration of Microsoft Defender for Endpoint with the company’s leading Managed Detection... More
Is ‘Gamification’ Key to Better Cybersecurity Training? (Tech Monitor)
A new approach is required to cybersecurity training, experts believe. Gamification techniques could help make courses more engaging.... More
Amazon Unveils New Security Features for AWS Lake Formation (VentureBeat)
Amazon Web Services announced new features for providing secure access to sensitive data in the AWS Lake Formation data lake service, with the introduction of row- and cell-level s... More
Client vs. Headend Watermarking – What’s the Best Approach for OTT? (Synamedia Blog)
In the first blog of this three-part series, Synamedia looks at how pirates attack watermarking solutions. Robustness, deployment and maintenance, user experience, content awarenes... More