Tag: Cybersecurity Insiders

Google to layoff 12k workers as its AI focus intensifies

After the launch of ChatGPT AI Chatbot, most of the technology company heads like Elon Musk and Satya Nadella feared that the deployment might lead to layoffs in many companies. Keeping aside others, Google, the Alphabet Inc’s business subsidiary, says…

Travelers Institute to Host Cybersecurity Symposium in Phoenix

PHOENIX–(BUSINESS WIRE)–The Travelers Institute, the public policy division of The Travelers Companies, Inc. (NYSE: TRV), will host an in-person Cyber: Prepare, Prevent, Mitigate, Restore® symposium on Thursday, Jan. 26, in Phoenix. The event, which is part of a national series,…

Arcserve Unified Data Protection 9.0 Boosts Enterprise Data Resilience

EDEN PRAIRIE, Minn.–(BUSINESS WIRE)–Arcserve, the world’s most experienced provider of backup, recovery and immutable storage solutions for unified data resilience against ransomware and disasters, today unveiled Arcserve Unified Data Protection (UDP) 9.0. Arcserve UDP 9.0 is a single platform, centrally…

LATEST CYBERTHREATS AND ADVISORIES – JANUARY 20, 2023

TikTok is fined for a privacy violation, major corporations suffer breaches and Vice Society attacks another school. Here are the latest threats and advisories for the week of January 20, 2023. Threat Advisories and Alerts U.K. School Survey Reveals Surprising…

IT/OT convergence and Cybersecurity best practices

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Most of the time, the advantages of technology…

ISG to Publish Reports Evaluating Cybersecurity Providers

STAMFORD, Conn.–(BUSINESS WIRE)–Information Services Group (ISG) (Nasdaq: III), a leading global technology research and advisory firm, has launched a research study examining how cybersecurity providers can help enterprises and U.S. public sector organizations reduce cyberthreats and better protect their valuable…

Hacker steals data of 37 million T Mobile customers

T Mobile hack is back in news as the telecom company is accusing a hacker of fraudulently stealing customer data from its servers. Earlier, the company was targeted by a sophistication filled digital attack. But now, the company has made…

Cyber Attack news headlines trending on Google

The first news that is trending is associated with financial service provider PayPal. News is out that social security numbers of nearly 35,000 users were leaked in a cyber attack that could have emerged from a credential stuffing campaign launched…

Are WE the firewall?

As we start a new year, let's think about how we can draw up a plan to exercise our cyber fitness and make it a culture that sticks. It's a critical time to get this done as we work toward…

[redacted] Taps Adam Flatley to Lead [rTIC Ghost Group

AUSTIN, Texas–(BUSINESS WIRE)–Redacted, the mission-driven cybersecurity company that levels the playing field against attackers, today announced that Adam Flatley has been promoted to Vice President of Intelligence leading the Redacted Intelligence Cell, recently renamed [rTIC Ghost Group. The team of…

HUMAN Orchestrates Unprecedented Private Takedown, VASTFLUX

NEW YORK–(BUSINESS WIRE)–HUMAN Security, Inc., the global leader in safeguarding enterprises from digital attacks with modern defense, today announced the takedown of a highly sophisticated ad fraud operation where more than 1,700 apps were spoofed, targeting 120 publishers, running ads…

LATEST CYBERTHREATS AND ADVISORIES – JANUARY 13, 2023

Cybercriminals attack schools, the FCC looks to change data breach rules and artificial intelligence alters the cybersecurity landscape. Here are the latest threats and advisories for the week of January 13, 2023. Threat Advisories and Alerts How Businesses Can Securely…

Microsoft works with partners on Cybercrime Atlas

Microsoft, in association with Fortinet and other partners, is working on mapping cyber crime activities and attain responses to cyber threats on public and private entities. The program was developed in the year 2019 and after a long pause, the…

CISSP-ISSAPs – We Need Your Input

With more than 150,000 CISSPs around the world, some of you have asked – what's the next step? For many of you, that next step is one of the CISSP concentrations focused on security architecture, engineering or management. The CISSP-ISSAP…

QuSecure Achieves Critical Breakthrough in Post-Quantum Encryption Over Public Internet – Closes Loop for End-to-End Quantum-Safe Data Security

SAN MATEO, Calif.–(BUSINESS WIRE)–QuSecure™, Inc., a leader in post-quantum cybersecurity (PQC), today launched QuEverywhere™, its most recent breakthrough in quantum-safe cryptography orchestration. QuEverywhere is the industry’s first quantum-safe orchestration solution protecting encrypted private data on any website or mobile application…

Latest Cyberthreats and Advisories – December 23, 2022

Ransomware hits hard around the world – again, Cybercriminals steal food and Fortnite’s developer is fined millions. Here are the latest threats and advisories for the week of December 23, 2022.  Threat Advisories and Alerts  Criminal Actors Use BEC Attacks…

The dos and don’ts of ransomware negotiations

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Has your organization suddenly been attacked by a…

Help Shape the CGRC Exam – Formerly Known As CAP

As practitioners know all too well, it is paramount to remain up to date with the changing landscape of cybersecurity. We regularly conduct Job Task Analysis (JTA) studies to review exam content and outlines to ensure the accuracy, relevance and…

Importance of having a Threat Intelligence Platform

First, a Threat Intelligence Platform (TIP) is nothing but a converged form of information aggregating platform that helps an organization gain insights on the latest attack campaigns and treats developing in the current cyber threat landscape. It helps organizations in…

Hypori, Inc. Secures Series B to Redefine Zero-Trust BYOD

RESTON, Va.–(BUSINESS WIRE)–Hypori, an award-winning SaaS company transforming secure access to data from the edge, announced today the close of an initial $10.5 million Series B investment led by Hale Capital Partners with additional funds from Series A investor GreatPoint…

Latest Cyberthreats and Advisories – January 6, 2023

The LockBit ransomware gang apologizes, Google settles privacy lawsuits and cybercriminals impersonate brands and the U.K. government. Here are the latest threats and advisories for the week of January 6, 2023. Threat Advisories and Alerts Cybercriminals Impersonate Brands with Search…

ProArch Acquires Data Protection Firm Trum & Associates

ATLANTA–(BUSINESS WIRE)–ProArch, a global IT consulting and services organization, announced the acquisition of Trum & Associates (Trum), a data protection company with a deep understanding of regulatory compliance headquartered in Destin, Florida. The acquisition expands ProArch’s cybersecurity and governance, risk,…

IT/OT convergence and Cybersecurity best practices

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Most of the time, the advantages of technology…

(ISC)² Top-Ranked Webinars of 2022 by Region

From fighting the ever-present ransomware threat to securing cloud infrastructures to honing identity management practices, the past year’s showcase of (ISC)² webinar topics was wide-ranging and thought-provoking. A cursory look at the topics we tackled throughout 2022 provides a reflection of…

Cyber Attack news headlines trending on Google

First, is the news that the Indian government has launched its own Mobile Operating systems that have capabilities to take on international rivals like iOS and Android. Within the next few weeks, the government of the sub-continent is preparing to…

How to handle personal data of students

School districts are constantly being targeted by cyber attacks, leading to data breaches and information misuse. So, to those who are worried about the privacy of student info, here are some tips to protect it from prying eyes. 1.) Categorization…

Seasons Greetings from (ISC)2

Dear (ISC)² Members, Associates and Candidates:  I hope this message finds you well. As 2022 comes to an end, I am grateful for the opportunity to reflect on the past year and all we have achieved together.   Launching an entry-level certification…

Beyond Identity Receives FIDO2 Certification

NEW YORK–(BUSINESS WIRE)–Beyond Identity, the leading provider of passwordless, phishing-resistant MFA, announced today that it has received FIDO2 certification. The company’s advanced authentication platform dramatically simplifies enterprise adoption of standards-based passwordless authentication and phishing-resistant MFA. Beyond Identity extends FIDO2 with…

LATEST CYBERTHREATS AND ADVISORIES – JANUARY 13, 2023

Cybercriminals attack schools, the FCC looks to change data breach rules and artificial intelligence alters the cybersecurity landscape. Here are the latest threats and advisories for the week of January 13, 2023. Threat Advisories and Alerts How Businesses Can Securely…

McNally Capital Announces Investment in Xcelerate Solutions

CHICAGO–(BUSINESS WIRE)–McNally Capital (“McNally”), a lower middle-market private equity firm focused on founder and family-owned businesses, is pleased to announce an investment in Xcelerate Solutions (“Xcelerate”). Xcelerate is a leading defense and national security company, providing integrated solutions delivered through…

CTN Solutions Appoints New Advisory Board

BLUE BELL, Pa.–(BUSINESS WIRE)–CTN Solutions has appointed a new advisory board to provide support and guidance to our CEO Drew Morrisroe as our company continues to execute on our growth strategy. Drew Morrisroe, President & CEO, stated, “A key factor…

Microsoft introduces voice copying AI tool

Microsoft, the technology giant of America, has achieved a new milestone in Artificial Intelligence by introducing a voice mimicking AI tool dubbed ‘Vall-E’. The tool has enough potential to copy a voice within 3 seconds and can easily create an…

CISSP-ISSAPs – We Need Your Input

With more than 150,000 CISSPs around the world, some of you have asked – what's the next step? For many of you, that next step is one of the CISSP concentrations focused on security architecture, engineering or management. The CISSP-ISSAP…

Cuba Ransomware gang hacking Microsoft Exchange Servers

Microsoft issued a press update that Cuba Ransomware gang were after its exchange servers after exploiting critical server-side request forgery (SSRF) vulnerability. Incidentally, the same flaw is also being exploited by ‘Play’ Ransomware group that hacked into the cloud servers…

Wallarm adds Cybersecurity Leaders to its Board of Advisors

SAN FRANCISCO–(BUSINESS WIRE)–Wallarm, the end-to-end API security company, is pleased to introduce the newest cybersecurity luminaries to join the company’s already impressive Board of Advisors. Each new member brings broad and in-depth cybersecurity and business expertise, and are eager to…

IW’s GRAYPATH, Next-Gen VPN Solution, Aligned with US Army’s Plans to Offset Contested Communications with Multipath Transport Agnostic Capabilities, Awarded Prime Contract from Defense Agency

RESTON, Va.–(BUSINESS WIRE)–Intelligent Waves (IW), a leading IT integrator that delivers mission-focused multi-domain operational expertise and innovation to the Government through high-impact technology solutions, announced today that GRAYPATH, its flagship Next-Gen VPN solution, has been awarded a prime contract with…

Help Shape the CGRC Exam – Formerly Known As CAP

As practitioners know all too well, it is paramount to remain up to date with the changing landscape of cybersecurity. We regularly conduct Job Task Analysis (JTA) studies to review exam content and outlines to ensure the accuracy, relevance and…

Latest Cyberthreats and Advisories – December 23, 2022

Ransomware hits hard around the world – again, Cybercriminals steal food and Fortnite’s developer is fined millions. Here are the latest threats and advisories for the week of December 23, 2022.  Threat Advisories and Alerts  Criminal Actors Use BEC Attacks…

Are WE the firewall?

As we start a new year, let's think about how we can draw up a plan to exercise our cyber fitness and make it a culture that sticks. It's a critical time to get this done as we work toward…

NTT Joins U.S. Government Public-Private Cybersecurity Initiative JCDC

TOKYO–(BUSINESS WIRE)–NTT Corporation (NTT) is pleased to announce its membership in the Joint Cyber Defense Collaborative (JCDC) to further strengthen the U.S. government focus on cybersecurity and boost resilience internationally. Established by the U.S. Cybersecurity and Infrastructure Security Agency (CISA)…

CrowdStrike Named to Glassdoor’s Best Places to Work in 2023 List

AUSTIN, Texas–(BUSINESS WIRE)–CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced it has been honored with a Glassdoor Employees’ Choice Award, which recognizes the Best Places to Work in 2023. CrowdStrike landed…

Conceal Partners with Thousand Guards to Expand into MSSP Markets

AUGUSTA, Ga.–(BUSINESS WIRE)–Conceal, the leader in protecting against web-based attacks, today announced it is expanding into the Spain, France, Italy, and Portugal MSSP markets through a strategic partnership with Thousand Guards, a Southern European based consulting firm whose mission is…