FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdaySecurity

Simplifying Zero Trust Security in Healthcare Organizations

By Kapil Raina, VP Zero Trust & Identity Marketing, CrowdStrike
Healthcare organizations are increasingly looking at zero trust to help deter ransomware attacks, safeguard PHI, and prevent downtime.

  • February 3rd 2022 at 19:11

Big Pharma Finds Patch Management a Bitter Pill

By Dark Reading Staff, Dark Reading
One-quarter of pharmaceutical manufacturers received a failing grade on patch management, which is a vital step in heading off ransomware attacks.

  • February 3rd 2022 at 19:00

Hackers Went Wild in 2021 β€” Every Company Should Do These 5 Things in 2022

By Lech Sandecki, Product Strategy Manager, Canonical, the publisher of Ubuntu
Practical steps companies can take to defend their critical infrastructure and avoid the financial and reputational damage that could result from a breach.

  • February 3rd 2022 at 15:00

If My Organization Is Mostly in the Cloud, Do I Need a Firewall?

By Heather Paunet, Senior Vice President, Untangle
A firewall is still a valuable part of the IT security stack, but businesses need to consider all of their attack surfaces.

  • February 2nd 2022 at 23:00

Cato Networks Delivers Instant Visibility and Control of Cloud Application Data Risk

CASB Cato converges a full CASB into its global SASE platform to defend enterprises against data breach and cloud-delivered threats.
  • February 2nd 2022 at 21:16

INKY Completes Email Security Offering With Launch of Outbound Mail Protection

INKY Outbound Mail Protection manages a multistep approval workflow providing enforcement within the email system itself.
  • February 2nd 2022 at 21:00

WhiteSource Threat Report Reveals Massive Uptick In Cyberattacks Related To JavaScript npm

More than 1,300 malicious npm packages have been discovered for use in supply chain attacks, cryptojacking, data stealing, and more.
  • February 2nd 2022 at 20:30

Why Security Pros Are Frustrated With Cloud Security

By Robert Lemos, Contributing Writer
As companies shift more operations to the cloud, a shortfall in security talent and too much security data wastes more than half of the time spent on security issues, a survey finds.

  • February 2nd 2022 at 20:27

Foresite Cybersecurity Acquires Cyber Lantern

Support for more than 160 important compliance standards have been integrated into SaaS solution for small and midsize enterprises.
  • February 2nd 2022 at 20:00

Managing Detections Is Not the Same as Stopping Breaches

By Austin Murphy, vice-president of managed services, CrowdStrike
Enterprises interested in managed detection and response (MDR) services to monitor endpoints and workloads should make sure the providers have rock-solid expertise in detecting and responding to threats.

  • February 2nd 2022 at 18:30

The Real-World Impact of the Global Cybersecurity Workforce Gap on Cyber Defenders

By Clar Rosso, CEO, (ISC)Β²
The effect is nuanced β€” and fundamental to cyber defense for organizations and nations.

  • February 2nd 2022 at 18:00

Elementor WordPress plugin has a gaping security hole – update now

By Paul Ducklin
We shouldn't need to say, "Check your inputs!" these days, but we're saying it anyway.

Olympic Athletes Advised by FBI to Bring 'Burner' Phones to Beijing

By Dark Reading Staff, Dark Reading
No specific threats against the Olympics, according to the FBI, but instead it's about vigilance against potential ones.

  • February 2nd 2022 at 15:10

8 Security Dinosaurs and What Filled Their Footprints

By Ericka Chickowski, Contributing Writer
Security technology has to evolve as new threats emerge and defenses improve. Here is a look back at the old breeds that are dying out.

  • February 2nd 2022 at 15:10

TikTok's Roland Cloutier: How CISOs Can Foster a Culture of Security & Transparency

By Jack Koziol, CEO & Founder, Infosec Institute
The social media platform's global security chief boils it down to being consistent, keeping it fun, and demonstrating the impact of choices.

  • February 2nd 2022 at 15:00

Tens of Thousands of Websites Vulnerable to RCE Flaw in WordPress Plug-in

By Jai Vijayan, Contributing Writer
Now-patched issue in Essential Addons for Elementor gives attackers a way to carry out local file inclusion attacks, researchers say.

  • February 2nd 2022 at 14:30

Secure Web Browsers Tackle Ransomware, Insider Threat in Enterprises

By Fahmida Y. Rashid, Features Editor, Dark Reading
Enterprise security teams can use secure Web browsers to apply controls and governance to cloud applications and customer data.

  • February 1st 2022 at 23:36

ThycoticCentrify Renamed Delinea

By Dark Reading Staff, Dark Reading
Privileged access management vendor rebrands.

  • February 1st 2022 at 23:04

Nucleus Security Forms Strategic Partnership with Mandiant

Intent is to enhance vulnerability management programs with operationalized threat intelligence.
  • February 1st 2022 at 23:00

Vectra Acquires Siriux Security Technologies to Extend Leadership in Identity and SaaS Threat Management

The acquisition positions Vectra to help customers securely configure and detect active threats in cloud identity and SaaS applications, including Microsoft Azure AD and Microsoft 365.
  • February 1st 2022 at 22:30

Forescout Acquires CyberMDX to Expand Healthcare Cybersecurity Focus

Acquisition adds Internet of Medical Things (IoMT) expertise to Forescout’s IT, IoT, and OT coverage.
  • February 1st 2022 at 22:20

Ping Identity Launches PingOne DaVinci

No-code identity orchestration service enables organizations to design better user experiences with drag-and-drop simplicity.
  • February 1st 2022 at 22:20

Digital Shadows Launches New Vulnerability Intelligence Module

New capability simplifies challenge of prioritizing CVEs for faster triage and remediation.
  • February 1st 2022 at 22:15

Disclosure, Panic, Patch: Can We Do Better?

By Robert Lemos, Contributing Writer
Companies struggle to understand the extent to which they are affected by vulnerabilities in open source software, but security specialists and maintainers are striving to secure the ecosystem.

  • February 1st 2022 at 22:00

ShiftLeft CORE 'Velocity Update' Streamlines Triage, Automates Build Security Controls

New features empower developers and AppSec teams to streamline the triage process and automate security controls.
  • February 1st 2022 at 20:00

Linux kernel patches β€œperformance can be harmful” bug in video driver

By Paul Ducklin
This bug is fiendishly hard to exploit - but if you patch, it won't be there to exploit at all.

7 Red Flags That Can Stop Your Company From Becoming a Unicorn

By Pam Baker, Contributing Writer
Investors and venture capitalists share the reasons that make them turn away from investing in your security tech.

  • February 1st 2022 at 19:00

Complexity vs. Capability: How to Bridge the Security Effectiveness Gap

By Martin Roesch, CEO, Netography
Consolidation and automation are among the strategies for balancing security complexity and capability.

  • February 1st 2022 at 18:00

Qualys Adds Advanced Remediation Capabilities to Minimize Vulnerability Risk

Update to Qualys Cloud Platform enables organizations to fix asset misconfigurations in addition to patching to achieve comprehensive remediation.
  • February 1st 2022 at 15:15

Mastercard Launches Global Cybersecurity Alliance Program to Further Secure The Digital Ecosystem

New program helps partners accelerate growth and provide scaled delivery of critical cybersecurity and risk services.
  • February 1st 2022 at 15:05

Critical Log4j Vulnerabilities Are the Ultimate Gift for Cybercriminals

By Ariel Parnes, Co-Founder and Chief Operating Officer, Mitiga
It's important to assume you have been vulnerable for months if not years, and to plan β€” and patch β€” accordingly.

  • February 1st 2022 at 15:00

NortonLifeLock Introduces Social Media Monitoring

New feature helps protect against social media account takeovers and cyberbullying.
  • February 1st 2022 at 15:00

Coalition Launches Executive Risks Products With Personalized Risk Assessment

Coalition now offering Directors & Officers (D&O) and Employment Practices Liability (EPL) with new tools and features to all broker partners.
  • February 1st 2022 at 13:22

Cymulate Launches Service to Augment In-House Security Teams

Amplify bolsters organizations with limited resources to optimize their security posture.
  • February 1st 2022 at 13:20

Security Service Edge Boosters Form New Forum to Encourage Adoption

By David Bisson, Contributing Writer
IT leaders who formed the SSE Forum say the technology offers cloud-forward security for modern workplaces.

  • February 1st 2022 at 00:00

Mandiant: 1 in 7 Ransomware Extortion Attacks Exposes OT Data

By Dark Reading Staff, Dark Reading
Analysis of "shaming site" data dumps found sensitive documentation from OT organizations, including oil and gas.

  • January 31st 2022 at 23:12

BlackBerry Agrees to Sell Legacy Patents for $600M

It has entered into a patent sale agreement with Catapult IP Innovations.
  • January 31st 2022 at 22:29

Aggressive BlackCat Ransomware on the Rise

By Robert Lemos, Contributing Writer
The cybercriminals behind the malware claim to have compromised more than a dozen companies; they have aggressively outed victims and purportedly paid a significant share of ransoms back to affiliates.

  • January 31st 2022 at 21:43

Website operator fined for using Google Fonts β€œthe cloudy way”

By Paul Ducklin
Google Fonts are OK, it seems, but only if everyone keeps their own copy of the fonts they use.

  • January 31st 2022 at 17:58

7 Privacy Tips for Security Pros

By Steve Zurier, Contributing Writer
How best to integrate privacy into your organization's security program.

  • January 31st 2022 at 15:50

The Zero-Trust Timer Is on for Federal Agencies β€” How Ready Are They?

By Ericka Chickowski, Contributing Writer
A new study coincides with OMB’s finalization of its zero-trust strategy through 2024.

  • January 31st 2022 at 15:17

Crypto Agility: Solving for the Inevitable

By David Ott, Senior Researcher, VMware Research
The advent of viable quantum computers will threaten today’s encryption standards, which are the basis of Internet security. Cryptographic agility is the key to post-quantum computing security, although implementing it will be a formidable challenge.

  • January 31st 2022 at 15:00

The Looming CISO Mental Health Crisis β€” and What to Do About It, Part 2

By Shamla Naidoo, Head of Cloud Strategy & Innovation, Netskope
Letting mental health issues fester may result in burnout and attrition, which affect both the company and the humans it employs.

  • January 31st 2022 at 14:00

Coronavirus SMS scam offers home PCR testing devices – don’t fall for it!

By Paul Ducklin
Free home PCR devices would be technological marvels, and really useful, too. But there aren't any...

Energy Sector Still Needs to Shut the Barn Door

By Dark Reading Staff, Dark Reading
One third of the companies studied haven't fixed their credential management β€” the same issue that led to the Colonial Pipeline hack last May.

  • January 28th 2022 at 21:35

The Looming CISO Mental Health Crisis β€” and What to Do About It, Part 1

By Shamla Naidoo, Head of Cloud Strategy & Innovation, Netskope
The next big threat to corporate security may not be a new strain of malware or innovative attacker tactics, techniques, and processes. It may be our own mental health.

  • January 28th 2022 at 18:30

More Security Flaws Found in Apple's OS Technologies

By Jai Vijayan, Contributing Writer
Apple's latest updates included fixes for two zero-day flaws, several code execution bugs, and vulnerabilities that allowed attackers to bypass its core security protections.

  • January 28th 2022 at 15:00

Navigating Nobelium: Lessons From Cloud Hopper & NotPetya

By James Campbell, Co-Founder and CEO, Cado Security
Nearly every organization should assume that it is at risk, but there are ways of countering the tactics used by advanced persistent threats.

  • January 28th 2022 at 15:00

Data Privacy Day 2022: How Can AI Help in the Fight Against Ransomware?

By Maxine Holt, Research Director, Omdia
Fewer than one-quarter of organizations believe they are fully prepared for a ransomware attack, threatening data privacy

  • January 28th 2022 at 09:00

Phishing Simulation Study Shows Why These Attacks Remain Pervasive

By Robert Lemos, Contributing Writer
Email purportedly from human resources convinced more than one-fifth of recipients to click, the majority of whom did so within an hour of receiving the fraudulent message.

  • January 27th 2022 at 22:53

Security Service Edge: 4 Core Tenets for Your SASE Journey

By Jason Clark, Chief Security Officer & Chief Strategy Officer, Netskope
Historically we've held network conversations to address security problems, but that doesn't work in a cloud-based world.

  • January 27th 2022 at 22:35

Apple fixes Safari data leak (and patches a zero-day!) – update now

By Paul Ducklin
That infamous "supercookie" bug in Safari has now been fixed. Oh, and there was a zero-day kernel hole as well.

apple-1200

IFSEC Seeks Security Pros for New Survey on Physical Access Control

By IFSEC Global, Staff
Take part in an IFSEC Global survey to better understand the state of access control in 2022.

  • January 27th 2022 at 18:00

With Cloud the Norm, Insiders Are Everywhere β€” and Pose Greater Risk

By Robert Lemos, Contributing Writer
After companies accelerated their adoption of cloud infrastructure, remote workers are now insiders and pose significant risks, and costs, to companies.

  • January 27th 2022 at 16:36

Barracuda Expands Email and Endpoint Protection Capabilities in MSP Security Offerings

Barracuda enhances SKOUT Managed XDR offering via new integration with Barracuda Email Protection and alliance with SentinelOne for endpoint protection.
  • January 27th 2022 at 15:25

Log4j Proved Public Disclosure Still Helps Attackers

By Alex Haynes, Chief Information Security Officer, CDL
Disclosure also puts organizations in the awkward position of trying to mitigate a vulnerability without something like a vendor patch to do the job.

  • January 27th 2022 at 15:00
❌