We know that storytelling is a key to communicating risk to the business. How do we integrate metrics to help us tell those stories? Check out this post for the […] The post Telling Stories with Security Metrics appeared first…
Tag: CISO Series
Cybersecurity News: Australia targets foreign tech, banks sunset OTP, Veeam vulnerability exploited
Australia targets government tech under foreign control Australia’s Department of Home Affairs issued new instructions to all government agencies, ordering them to review their tech stacks for Foreign Ownership, Control […] The post Cybersecurity News: Australia targets foreign tech, banks…
Getting Visibility into Your Cyber Horizon with OpenText
New AI tools can be a boon for defenders, but they’re also leading to increased phishing, smarter threat actors, and advanced reconnaissance tactics. Paul Reid, global head of threat intelligence, […] The post Getting Visibility into Your Cyber Horizon with…
Cybersecurity News: Russian bot takedown, Burdensome cyber regs, Fujitsu data exposed
In today’s cybersecurity news… US disrupts Russian AI-powered disinformation bot farm A joint international law enforcement operation led by the U.S. Justice Department has seized email servers, domains and nearly […] The post Cybersecurity News: Russian bot takedown, Burdensome cyber…
How to Get the Most for Yourself Through Altruism
When we talk about giving back to the community, there’s an inevitable element of self-interest layered on as well. Sure your blog provides information to others, but it also raises […] The post How to Get the Most for Yourself…
Cybersecurity News: Billions of stolen passwords, cybersecurity regulations even trickier, Apple removes popular apps
Record-breaking 10 billion stolen passwords exposed It appears to be the largest collection of stolen and leaked credentials ever seen on the crime marketplace BreachForums. Security researchers from Cybernews report […] The post Cybersecurity News: Billions of stolen passwords, cybersecurity…
Answering SEC’s Question of Materiality of a Breach
What is the “materiality” of a breach? Jason Clark, chief strategy officer for Cyera, and I discussed trying to answer this amorphous question that the SEC presented to companies and […] The post Answering SEC’s Question of Materiality of a…
Cybersecurity News: Alabama Education breach, OpenAI secrets breach, Florida Health breach
In today’s cybersecurity news… Alabama Department of Education suffers data breach Financially motivated foreign threat actors are suspected of being behind a breach at the Alabama State Department of Education, […] The post Cybersecurity News: Alabama Education breach, OpenAI secrets…
Cybersecurity News: Senator pressures CISA, Velvet Ant exploits Cisco, Europol crushes Cobalt
In today’s cybersecurity news… Senate leader demands answers from CISA re March Ivanti hack Sen. Charles Grassley of Iowa has sent a message to CISA chief Jen Easterly, requesting further […] The post Cybersecurity News: Senator pressures CISA, Velvet Ant…
Join Us 07-19-24 for “Hacking SOC Automation” – Super Cyber Friday
Please join us on Friday July 19, 2024 for Super Cyber Friday. Our topic of discussion will be Hacking SOC Automation: An hour of critical thinking about how the line […] The post Join Us 07-19-24 for “Hacking SOC Automation”…
Cybersecurity News: Evolve breach update, Patelco cyberattack, LockBit claims Croatian cyberattack
In today’s cybersecurity news… Evolve Bank data breach is…. evolving Following up on a story we brought to you this past Friday on Cyber Security Headlines, loan company Affirm is […] The post Cybersecurity News: Evolve breach update, Patelco cyberattack,…
Who Owns AI Risk? NOT IT!
As an emerging technology, there are a lot of questions about who owns the risk inherent with new AI and LLM-based tools. But even though this technology offers exciting new […] The post Who Owns AI Risk? NOT IT! appeared…
Cybersecurity News: 14 million Linux systems threatened, critical patch for Juniper routers, millions impacted by Prudential breach
14 million Linux systems threatened by ‘RegreSSHion’ vulnerability Researchers at Qualys have uncovered a critical vulnerability, “regreSSHion” (CVE-2024-6387), which some experts are comparing to the notorious Log4Shell in terms of […] The post Cybersecurity News: 14 million Linux systems threatened,…
Cybersecurity News: TeamViewer breach update, HubSpot customer attacks, Cyber insurance problems
In today’s cybersecurity news… Update on the TeamViewer network breach The remote access software company is now attributing Wednesday’s attack on its corporate networks as being the work of Russian […] The post Cybersecurity News: TeamViewer breach update, HubSpot customer…
Cybersecurity News: Gas chromatograph vulnerabilities, Cloudflare rebukes Polyfill, Evolve Bank breach
In today’s cybersecurity news… Gas chromatograph vulnerabilities reveal medical IoT challenges The research firm Claroty has revealed four vulnerabilities within the model Rosemount 370XA gas chromatograph manufactured by Emerson. This […] The post Cybersecurity News: Gas chromatograph vulnerabilities, Cloudflare rebukes…
Securing Identities in the Cloud
How are we securing identity in the cloud? Unlike on-prem, the cloud requires you to cede control to a vendor. So what can we do to keep identities safe? Check […] The post Securing Identities in the Cloud appeared first…
Cybersecurity News: Snowblind Android, identity services leaks data, Polyfill.io supply chain attack
In today’s cybersecurity news… Android lying Snowblind in the sun Security researchers at Promon released a report on an Android malware called Snowblind. This utilizes the Linux “seccomp” security feature […] The post Cybersecurity News: Snowblind Android, identity services leaks…
The Crucial Role of Network Segmentation in OT Environments with DirectDefense
Network segmentation plays a critical role in Operational Technology (OT) environments. Contrary to popular belief that segmentation is primarily for resilience and uptime, Christopher Walcutt, CSO, DirectDefense emphasizes that it’s […] The post The Crucial Role of Network Segmentation in…
Cybersecurity News: Julian Assange plea, Latest MOVEit bug, Neiman Marcus data sale
In today’s cybersecurity news… Julian Assange to plead guilty and return to Australia On Wednesday, WikiLeaks founder Julian Assange is scheduled to plead guilty to a single criminal charge in […] The post Cybersecurity News: Julian Assange plea, Latest MOVEit…
How About This? Only Attack the Endpoints We Configured
How are threat actors getting around EDR? Every solution out there will show how well it does in benchmarks, but that doesn’t seem to match real-world situations. Is there something […] The post How About This? Only Attack the Endpoints…