Category: Cyber Defense Magazine

When Businesses Get Hacked- Who Are the Victims?

Read the original article: When Businesses Get Hacked- Who Are the Victims? This article looks into who the victims are when an organization comes under attack. By Nicole Allen, Marketing […] The post When Businesses Get Hacked- Who Are the…

T-Mobile customers were hit with SIM swapping attacks

Read the original article: T-Mobile customers were hit with SIM swapping attacks The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM […] The post T-Mobile customers were hit with SIM swapping…

Top 100 Cybersecurity Hackers

Read the original article: Top 100 Cybersecurity Hackers The following list, in no particular order, contains the names, their countries of origins, their (biggest) victim (s) […] The post Top 100 Cybersecurity Hackers appeared first on Cyber Defense Magazine.  …

Top 100 Cybersecurity Breaches

Read the original article: Top 100 Cybersecurity Breaches Looking back over the past year, it’s impossible not to recognize the widespread data breaches that have caused […] The post Top 100 Cybersecurity Breaches appeared first on Cyber Defense Magazine.  …

Top 100 Managed Security Service Providers (MSSPs)

Read the original article: Top 100 Managed Security Service Providers (MSSPs) Well, let’s start with the basics. What is MSSP? It is short for Managed Security Service Provider. As […] The post Top 100 Managed Security Service Providers (MSSPs) appeared…

Top 100 Cybersecurity Movies

Read the original article: Top 100 Cybersecurity Movies The Computer Wore Tennis Shoes (1969) In The Computer Wore Tennis Shoes, Kurt Russell stars as an underachieving […] The post Top 100 Cybersecurity Movies appeared first on Cyber Defense Magazine.  …

Channeling as A Challenge

Read the original article: Channeling as A Challenge By Milica D. Djekic Abstract: The modern cyber systems could deal with some kinds of information leakage concerns […] The post Channeling as A Challenge appeared first on Cyber Defense Magazine.  …

Top 100 Cybersecurity Books

Read the original article: Top 100 Cybersecurity Books The Best Cybersecurity Book of all Time:  Analogue Network Security by Winn Schwartau For many centuries, books have […] The post Top 100 Cybersecurity Books appeared first on Cyber Defense Magazine.  …

Top 100 Cybersecurity News Sites

Read the original article: Top 100 Cybersecurity News Sites With millions of websites and downloadable files available on the internet, potential risks of security breach are high, […] The post Top 100 Cybersecurity News Sites appeared first on Cyber Defense…

Vulnerability Patching: Why Does It Fall Short So Often?

Read the original article: Vulnerability Patching: Why Does It Fall Short So Often? Weak threat insight, SecOps competing priorities, and fear of making things worse are key reasons By Chris Goettl, […] The post Vulnerability Patching: Why Does It Fall…

Brave New World: Safari Content Blocking

Read the original article: Brave New World: Safari Content Blocking By Andrey Meshkov, CEO and CTO at AdGuard Content blocking is not a priority for Apple and WebKit. […] The post Brave New World: Safari Content Blocking appeared first on…

MSSP Visionary Takes Bold Step into the Future

Read the original article: MSSP Visionary Takes Bold Step into the Future A Cyber Defense Magazine Exclusive Interview with Herjavec Group Founder & CEO Robert Herjavec UNDERSTANDING VISIONARIES LIKE ROBERT […] The post MSSP Visionary Takes Bold Step into the…

Data Risk, Intelligence and Insider Threats

Read the original article: Data Risk, Intelligence and Insider Threats When it comes to securing networks in today’s business environment, the single biggest challenge firms must contend with […] The post Data Risk, Intelligence and Insider Threats appeared first on…

Cyber Threats Facing Financial Institutions Amid COVID-19

Read the original article: Cyber Threats Facing Financial Institutions Amid COVID-19 By Pablo Castillo, Cyber Threat Research Analyst, Constella Intelligence COVID-19 has accelerated security research into the cybersecurity implications […] The post Cyber Threats Facing Financial Institutions Amid COVID-19 appeared…

3.2billion records leaked, Part II

Read the original article: 3.2billion records leaked, Part II The Largest compilation of emails and passwords (COMB), more than 3.2 billion login credentials, has been leaked on […] The post 3.2billion records leaked, Part II appeared first on Cyber Defense…

Cyberattacks On K-12 Education

Read the original article: Cyberattacks On K-12 Education Carefully allocating limited resources lets districts get the best bang for the buck. By Saryu Nayyar, CEO, Gurucul […] The post Cyberattacks On K-12 Education appeared first on Cyber Defense Magazine.  …

The Privileged Credential Security Advantage

Read the original article: The Privileged Credential Security Advantage By Tony Goulding, Cybersecurity Evangelist at Centrify Over time, a causality has emerged that accounts for the majority of security […] The post The Privileged Credential Security Advantage appeared first on…

Asset Management, The Weakest Link in Cybersecurity Risk

Read the original article: Asset Management, The Weakest Link in Cybersecurity Risk By Gyan Prakash, Head of Cyber Security / Security Engineering, Altimetrik Corp Summary This paper shares the details on the […] The post Asset Management, The Weakest Link…

Asset Management, The Weakest Link in Cybersecurity Risk

Read the original article: Asset Management, The Weakest Link in Cybersecurity Risk By Gyan Prakash, Head of Cyber Security / Security Engineering, Altimetrik Corp Summary This paper shares the details on the limitations of existing asset management solutions for Cybersecurity…

Anatomy of a hack – Solar Winds Orion

Read the original article: Anatomy of a hack – Solar Winds Orion Nation-State hacks major IS Software vender By James Gorman, CISO, Authx What happened when one of the leading IT to support vendors in the world, leading government agencies…

Cybersecurity Maturity Model Certification (CMMC)

Read the original article: Cybersecurity Maturity Model Certification (CMMC) It is not about compliance, or is it? By Carter Schoenberg, CISSP & CMMC Registered Practitioner Vice President – Cybersecurity SoundWay Consulting, Inc. As of the date of this publication, new…

Mapping Automation to the MITRE ATT&CK Framework

Read the original article: Mapping Automation to the MITRE ATT&CK Framework By Chris Calvert, vice president, product strategy, and co-founder Respond Software As major enterprises race to digitize their IT and line of business infrastructures, cybersecurity has become an imperative,…

Privacy Shield Revoked

Read the original article: Privacy Shield Revoked What This Means for EU-US Commercial Data Transfers By Dan Piazza, Technical Product Manager, Stealthbits Technologies On July 16th, the European Court of Justice (ECJ) struck down the EU-US data privacy agreement named…

Weaknesses of Biometric Authentication

Read the original article: Weaknesses of Biometric Authentication By Mark Perkins, MS, CISSP, IT Manager In today’s digital world, knowing who is on the other end of the wire is more important than ever.  The democratization of digital technology and…

5 Ways to Avoid Security Automation Pitfalls

Read the original article: 5 Ways to Avoid Security Automation Pitfalls By Joe Partlow, CTO at ReliaQuest Amid an enterprise attack surface that is more complex than ever, many security teams have turned to automation to boost threat detection and…

Cyber Warfare and Its Impact on Businesses

Read the original article: Cyber Warfare and Its Impact on Businesses By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments and the public have all witnessed unprecedented growth in the digital economy. From the design…

What Is Being Done, And How Can They Improve?

Read the original article: What Is Being Done, And How Can They Improve? By Martin Banks People have worried about the safety of nuclear energy since it first came around in the mid-twentieth century. Nuclear energy has a lot of…

Shields Up with MITRE – Free Active Defense Knowledgebase

Read the original article: Shields Up with MITRE – Free Active Defense Knowledgebase What’s Shield? Shield is an active defense knowledge base MITRE is developing to capture and organize what we are learning about active defense and adversary engagement. Derived…

Hackers use e-skimmer that exfiltrates payment data via Telegram

Read the original article: Hackers use e-skimmer that exfiltrates payment data via Telegram Researchers observed a new tactic adopted by Magecart groups, the hackers used Telegram to exfiltrate stolen payment details from compromised websites. Researchers from Malwarebytes reported that Magecart…

Cyber Against Granny

Read the original article: Cyber Against Granny By Yotam Gutman, SentinelOne Every year, cybercriminals steal approximately $40 billion from older adults (senior citizens aged  60 and over) in the United States. Cybercrime can be defined as “any criminal activity in…

Covid-19 Unveiled a New Security Gap

Read the original article: Covid-19 Unveiled a New Security Gap By Eddy Bobritsky, CEO & Co-Founder, Minerva Labs As COVID-19 spreads, more organizations are enforcing remote work from home, making employees home computers more vulnerable than ever to cyberattacks. The…

HIPAA Compliance and The Protection of Cyber Security

Read the original article: HIPAA Compliance and The Protection of Cyber Security By Andrew Mikhailov, CTO at Zfort Group Businesses face the risk of severe cyber-attacks – the present-day cyberspace criminals are well-organized, thoughtful, and marketable. And one of the…

Smart Gadgets in Proving Workplace Violence

Read the original article: Smart Gadgets in Proving Workplace Violence By Milica D. Djekic The violence at the workplace could start as the common insult, continue as the verbal abuse and end up as the mobbing attack that could get…

Is API Usage Putting Your Organization Out of Compliance?

Read the original article: Is API Usage Putting Your Organization Out of Compliance? By Matt Keil, Director of Product Marketing, Cequence Security APIs (“Application Programming Interfaces”) are increasingly being used as the conduit for data exchange between applications, infrastructure, and…

NIST Launches Zero Trust Architecture

Read the original article: NIST Launches Zero Trust Architecture The National Institute of Standards and Technology (NIST) launched the final version of the Special Publication (SP) 800-207 Zero Trust Architecture on August 11, 2020. Zero trust (ZT) is the term…

Looks Like Russian Hackers Are on An Email Scam Spree

Read the original article: Looks Like Russian Hackers Are on An Email Scam Spree By Tim Sadler, CEO, Tessian In 2019, businesses lost a staggering $1.8bn because of Business Email Compromise (BEC). These types of attacks, whereby a trusted relationship…

Getting Employees Back to the New Normal

Read the original article: Getting Employees Back to the New Normal Work will never be quite the same once the pandemic has passed By Brendan O’Connor, CEO, and Co-founder, AppOmni There are encouraging signs that the Covid-19 pandemic – arguably…

Security in The New Normal Requires an Agile Approach

Read the original article: Security in The New Normal Requires an Agile Approach By Danny Presten, Chief Methodologist at Digital.ai Phishing attacks are up 600%, ransomware attacks have increased 148%, and the FBI has reported a 300% increase in cybercrimes.…

Ransomware, Risk, And Recovery

Read the original article: Ransomware, Risk, And Recovery Why You Need to Take A Hard Look At Your Corporate Recovery Plan By Mickey Bresman, CEO, Semperis   What we as IT and security professionals worry about when planning for disaster…

Ritz hotel diners were victims of a sophisticated scam

Read the original article: Ritz hotel diners were victims of a sophisticated scam Guests at the luxury Ritz hotel in London have been victims of “extremely convincing” scammers who posed as hotel staff to steal payment card details. Clients having…

Network Security Is Not Data Security

Read the original article: Network Security Is Not Data Security Data is an organization’s most valuable asset, yet data loss is one of the biggest repercussions of a cyber-attack. By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks…

WireGuard – Separating Fact from Fiction

Read the original article: WireGuard – Separating Fact from Fiction By Tomislav Čohar, co-founder, hide.me VPN Offering high speeds, excellent levels of security and a low footprint, WireGuard has rightly caused ripples within the VPN industry. WireGuard is an open-source…

Cyber Warfare and its impact on businesses

Read the original article: Cyber Warfare and its impact on businesses By Kumar Ritesh, Founder and CEO, CYFIRMA Over the past two decades, businesses, governments, and the public have all witnessed unprecedented growth in the digital economy. From the design…

Cybersecurity Challenges When Working from Home

Read the original article: Cybersecurity Challenges When Working from Home By Renuka Sahane, Sr. Content Writer, Scalefusion Maintaining the security of corporate data when employees work remotely in the new normal. IT governance and cybersecurity have gained much-needed attention in…

Is What’s Lurking in Your Network About to Come Out?

Read the original article: Is What’s Lurking in Your Network About to Come Out? The COVID-19 crisis was an unprecedented opportunity for attackers. Now, many may be ready to strike. By Carolyn Crandall, Chief Deception Officer, Attivo Networks The COVID-19…

Cyber Security Market to Reach USD 400 Billion by 2026

Read the original article: Cyber Security Market to Reach USD 400 Billion by 2026 The cybersecurity market will be driven by rising demand for cyber protection as well as advanced network infrastructure security across enterprises. By Saloni Walimbe, Content Writer…

Reading the 2020 Cost of a Data Breach Report

Read the original article: Reading the 2020 Cost of a Data Breach Report 2020 Cost of a Data Breach Report: the global total cost of a data breach averaged $3.86 million in 2020, down about 1.5% from the 2019 study.…

How To Grow Your Cyber Expertise During A Pandemic

Read the original article: How To Grow Your Cyber Expertise During A Pandemic By Bradley Hayes, Chief Technology Officer at Circadence IT pros can still learn new skills despite perceived barriers to progressing professionally during the pandemic. While working circumstances…

FBI issued a flash alert about Netwalker ransomware attacks

Read the original article: FBI issued a flash alert about Netwalker ransomware attacks The FBI has issued a security alert about Netwalker ransomware attacks targeting U.S. and foreign government organizations. The FBI has issued a new security flash alert to warn of…

BlackHat USA 2020 – Hot Virtual Vegas Hacker Happenings…

Read the original article: BlackHat USA 2020 – Hot Virtual Vegas Hacker Happenings… Point3 Security “Virtual Vegas” Sessions Feature Topics Such as the Human Brain and Cybersecurity, Reverse Engineering Malware, and Pros & Cons of The NICE Security Workforce Frameworks…

The Black Unicorn Report for 2020 – A MUST READ!

Read the original article: The Black Unicorn Report for 2020 – A MUST READ! In the venture capital industry, a unicorn refers to any tech startup company that reaches a $1 billion-dollar market value as determined by private or public…

CRYPTO

Read the original article: CRYPTO An Amalgamation of Cyber Defense and Ethical Hacking Mechanisms By Staford Titus S Prelude Security on its own is a misnomer in this technological and (for the most part) cybernated era. Cyber-Security has emerged as…

The Future of Security – Predictions Post COVID-19

Read the original article: The Future of Security – Predictions Post COVID-19 By Mike Riemer, Pulse Secure, Global Chief Security Architect The Future of Work post COVID-19 – Larger Remote Workforce with Cybersecurity Built into the Culture “A recent Gartner…

Post COVID-19 Cybersecurity and Future-of-Work Predictions

Read the original article: Post COVID-19 Cybersecurity and Future-of-Work Predictions By Chris DeRamus, VP of Technology, Cloud Security Practice Remote work is here to stay: “Some organizations (including DivvyCloud) preferred coming into the office for work prior to the pandemic…