FreshRSS

πŸ”’
☐ β˜† βœ‡ The first stop for security news | Threatpost

Securing Your Move to the Hybrid Cloud

By Infosec Contributor β€” August 1st 2022 at 13:29
Infosec expert Rani Osnat lays out security challenges and offers hope for organizations migrating their IT stack to the private and public cloud environments.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Securing Your Move to the Hybrid Cloud

By Infosec Contributor β€” August 1st 2022 at 13:29
Infosec expert Rani Osnat lays out security challenges and offers hope for organizations migrating their IT stack to the private and public cloud environments.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Why Physical Security Maintenance Should Never Be an Afterthought

By Infosec Contributor β€” July 25th 2022 at 11:00
SecuriThings' CEO Roy Dagan tackles the sometimes overlooked security step of physical security maintenance and breaks down why it is important.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Why Physical Security Maintenance Should Never Be an Afterthought

By Infosec Contributor β€” July 25th 2022 at 11:00
SecuriThings' CEO Roy Dagan tackles the sometimes overlooked security step of physical security maintenance and breaks down why it is important.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Conti’s Reign of Chaos: Costa Rica in the Crosshairs

By Aamir Lakhani β€” July 20th 2022 at 12:35
Aamir Lakhani, with FortiGuard Labs, answers the question; Why is the Conti ransomware gang targeting people and businesses in Costa Rica?
☐ β˜† βœ‡ Threatpost | The first stop for security news

Conti’s Reign of Chaos: Costa Rica in the Crosshairs

By Aamir Lakhani β€” July 20th 2022 at 12:35
Aamir Lakhani, with FortiGuard Labs, answers the question; Why is the Conti ransomware gang targeting people and businesses in Costa Rica?
☐ β˜† βœ‡ The first stop for security news | Threatpost

How War Impacts Cyber Insurance

By Infosec Contributor β€” July 12th 2022 at 12:20
Chris Hallenbeck, CISO for the Americas at Tanium, discusses the impact of geopolitical conflict on the cybersecurity insurance market.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Rethinking Vulnerability Management in a Heightened Threat Landscape

By Infosec Contributor β€” July 11th 2022 at 20:26
Find out why a vital component of vulnerability management needs to be the capacity to prioritize from Mariano Nunez, CEO of Onapsis and Threatpost Infosec Insiders columnist.
☐ β˜† βœ‡ Threatpost | The first stop for security news

How War Impacts Cyber Insurance

By Infosec Contributor β€” July 12th 2022 at 12:20
Chris Hallenbeck, CISO for the Americas at Tanium, discusses the impact of geopolitical conflict on the cybersecurity insurance market.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Rethinking Vulnerability Management in a Heightened Threat Landscape

By Infosec Contributor β€” July 11th 2022 at 20:26
Find out why a vital component of vulnerability management needs to be the capacity to prioritize from Mariano Nunez, CEO of Onapsis and Threatpost Infosec Insiders columnist.
☐ β˜† βœ‡ The first stop for security news | Threatpost

A Guide to Surviving a Ransomware Attack

By Oliver Tavakoli β€” June 30th 2022 at 11:59
Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our defense posture.
☐ β˜† βœ‡ Threatpost | The first stop for security news

A Guide to Surviving a Ransomware Attack

By Oliver Tavakoli β€” June 30th 2022 at 11:59
Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our defense posture.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Top Six Security Bad Habits, and How to Break Them

By Infosec Contributor β€” June 28th 2022 at 13:05
Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based endpoint attacks.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Top Six Security Bad Habits, and How to Break Them

By Infosec Contributor β€” June 28th 2022 at 13:05
Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based endpoint attacks.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Gamification of Ethical Hacking and Hacking Esports

By Joseph Carson β€” June 22nd 2022 at 12:49
Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, explores why gamified platforms and hacking esports are the future.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Gamification of Ethical Hacking and Hacking Esports

By Joseph Carson β€” June 22nd 2022 at 12:49
Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, explores why gamified platforms and hacking esports are the future.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Ransomware Risk in Healthcare Endangers Patients

By Ryan Witt β€” June 16th 2022 at 11:24
Ryan Witt, Proofpoint's Healthcare Cybersecurity Leader, examines the impact of ransomware on patient care.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Ransomware Risk in Healthcare Endangers Patients

By Ryan Witt β€” June 16th 2022 at 11:24
Ryan Witt, Proofpoint's Healthcare Cybersecurity Leader, examines the impact of ransomware on patient care.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Taming the Digital Asset Tsunami

By Rob N. Gurzeev β€” June 8th 2022 at 13:36
Rob Gurzeev, CEO and Co-Founder of CyCognito, explores external attack surface soft spots tied to an ever-expanding number of digital assets companies too often struggle to keep track of and manage effectively.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Taming the Digital Asset Tsunami

By Rob N. Gurzeev β€” June 8th 2022 at 13:36
Rob Gurzeev, CEO and Co-Founder of CyCognito, explores external attack surface soft spots tied to an ever-expanding number of digital assets companies too often struggle to keep track of and manage effectively.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Cyber Risk Retainers: Not Another Insurance Policy

By Matt Dunn β€” June 7th 2022 at 13:25
The costs associated with a cyberattack can be significant, especially if a company does not have an Incident Response plan that addresses risk.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Cyber Risk Retainers: Not Another Insurance Policy

By Matt Dunn β€” June 7th 2022 at 13:25
The costs associated with a cyberattack can be significant, especially if a company does not have an Incident Response plan that addresses risk.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Cybercriminals Expand Attack Radius and Ransomware Pain Points

By Threatpost β€” June 2nd 2022 at 13:08
Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of "triple extortion" ransomware attacks.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Cybercriminals Expand Attack Radius and Ransomware Pain Points

By Threatpost β€” June 2nd 2022 at 13:08
Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of "triple extortion" ransomware attacks.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

By Threatpost β€” May 23rd 2022 at 12:47
Mohit Tiwari, CEO of Symmetry Systems, explores Zero Trust, data objects and the NIST framework for cloud and on-prem environments.
☐ β˜† βœ‡ Threatpost | The first stop for security news

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

By Threatpost β€” May 23rd 2022 at 12:47
Mohit Tiwari, CEO of Symmetry Systems, explores Zero Trust, data objects and the NIST framework for cloud and on-prem environments.
☐ β˜† βœ‡ The first stop for security news | Threatpost

Closing the Gap Between Application Security and Observability

By Threatpost β€” May 20th 2022 at 12:42
Daniel Kaar, global director application security engineering at Dynatrace, highlights the newfound respect for AppSec-enabled observability in the wake of Log4Shell.β€―
☐ β˜† βœ‡ Threatpost | The first stop for security news

Closing the Gap Between Application Security and Observability

By Threatpost β€” May 20th 2022 at 12:42
Daniel Kaar, global director application security engineering at Dynatrace, highlights the newfound respect for AppSec-enabled observability in the wake of Log4Shell.β€―
☐ β˜† βœ‡ The first stop for security news | Threatpost

You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius

By Tony Lauro β€” May 12th 2022 at 11:57
Tony Lauro, director of security technology and strategy at Akamai, discusses reducing your company's attack surface and the "blast radius" of a potential attack.
☐ β˜† βœ‡ Threatpost | The first stop for security news

You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius

By Tony Lauro β€” May 12th 2022 at 11:57
Tony Lauro, director of security technology and strategy at Akamai, discusses reducing your company's attack surface and the "blast radius" of a potential attack.
☐ β˜† βœ‡ The first stop for security news | Threatpost

CANs Reinvent LANs for an All-Local World

By David Canellos β€” May 5th 2022 at 13:00
A close look at a new type of network, known as a Cloud Area Network.
❌