After the launch of ChatGPT AI Chatbot, most of the technology company heads like Elon Musk and Satya Nadella feared that the deployment might lead to layoffs in many companies. Keeping aside others, Google, the Alphabet Inc’s business subsidiary, says…
Tag: Cybersecurity Insiders
Telephony fraud and risk mitigation: Understanding this ever-changing threat
Telephony fraud is a significant challenge. Companies of all sizes and industries are subjected to the malicious usage of voice and SMS with the intent of committing financial fraud, identity theft, denial-of-service, and a variety of other attacks. Businesses that…
How do the latest iPhone updates address Cybersecurity issues?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Apple is typically known for its minimal design,…
Bitdefender Internet Security Named AV-Comparatives’ Product of the Year
BUCHAREST, Romania & SANTA CLARA, Calif.–(BUSINESS WIRE)–Bitdefender, a global cybersecurity leader, today announced Bitdefender Internet Security has once again been named Product of the Year, for the highest overall scores throughout all 2022 tests, by AV-Comparatives, an industry leading independent…
Policy Brief – U.S. Cyber Threat Intelligence, Part 2: Summary, Recommendations & Challenges
By Aaron Weathersby, CISSP. Aaron is the Chief Information Officer for Charles R. Drew University of Medicine and Science and holds a Doctor of Science in Cyber Security from Marymount University. He is an Information Technology professional with over 18…
Travelers Institute to Host Cybersecurity Symposium in Phoenix
PHOENIX–(BUSINESS WIRE)–The Travelers Institute, the public policy division of The Travelers Companies, Inc. (NYSE: TRV), will host an in-person Cyber: Prepare, Prevent, Mitigate, Restore® symposium on Thursday, Jan. 26, in Phoenix. The event, which is part of a national series,…
Predictions 2023, Part 1: What will the new year bring for the InfoSec Community?
By Diana-Lynn Contesti, CISSP-ISSAP, ISSMP, CSSLP, SSCP In recent years, we have seen the threat landscape become increasingly complex as threat actors use sophisticated techniques to exploit vulnerabilities of weak passwords, missing patches and antiquated software, thus gaining access to…
Arcserve Unified Data Protection 9.0 Boosts Enterprise Data Resilience
EDEN PRAIRIE, Minn.–(BUSINESS WIRE)–Arcserve, the world’s most experienced provider of backup, recovery and immutable storage solutions for unified data resilience against ransomware and disasters, today unveiled Arcserve Unified Data Protection (UDP) 9.0. Arcserve UDP 9.0 is a single platform, centrally…
(ISC)² New Jersey Chapter Hosts International Event with 500 Attendees
The (ISC)² New Jersey Chapter held their first virtual international event, which hosted more than 20 thought leaders and 500 registered chapter member attendees. The International (ISC)² Chapter Conference, SECON International, took place virtually, on December 1, 2022, and delivered…
Key to success while implementing IAM- Best practices that every company should implement
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Identity and access management has emerged as an…
DefenseStorm Named Inc. 5000 Fastest-Growing Private Company with 251% Growth Rate
ALPHARETTA, Ga.–(BUSINESS WIRE)–DefenseStorm, a leading cloud-based cybersecurity, cyber fraud and cyber compliance management provider to regional and community banks and credit unions, today announced separate recognitions for its exceptional growth, transformative financial services solutions and customer loyalty. With impressive three-year…
LATEST CYBERTHREATS AND ADVISORIES – JANUARY 20, 2023
TikTok is fined for a privacy violation, major corporations suffer breaches and Vice Society attacks another school. Here are the latest threats and advisories for the week of January 20, 2023. Threat Advisories and Alerts U.K. School Survey Reveals Surprising…
IT/OT convergence and Cybersecurity best practices
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Most of the time, the advantages of technology…
AT&T Cybersecurity awarded the Palo Alto Networks 2022 Partner of the Year Award
AT&T Cybersecurity received the Palo Alto Networks 2022 Partner of the Year Award for its managed security services at the annual Palo Alto Networks Ignite 2022 conference. The awards are presented to an elite group of Palo Alto Networks partners…
ISG to Publish Reports Evaluating Cybersecurity Providers
STAMFORD, Conn.–(BUSINESS WIRE)–Information Services Group (ISG) (Nasdaq: III), a leading global technology research and advisory firm, has launched a research study examining how cybersecurity providers can help enterprises and U.S. public sector organizations reduce cyberthreats and better protect their valuable…
Hacker steals data of 37 million T Mobile customers
T Mobile hack is back in news as the telecom company is accusing a hacker of fraudulently stealing customer data from its servers. Earlier, the company was targeted by a sophistication filled digital attack. But now, the company has made…
Cyber Attack news headlines trending on Google
The first news that is trending is associated with financial service provider PayPal. News is out that social security numbers of nearly 35,000 users were leaked in a cyber attack that could have emerged from a credential stuffing campaign launched…
Impact Podcast with John Shegerian Features The Home Depot’s Ron Jarvis
LOS ANGELES–(BUSINESS WIRE)–Ron Jarvis, Chief Sustainability Officer for The Home Depot, is the featured guest this week on the Impact Podcast with John Shegerian. The show is hosted by Shegerian, Co-Founder and Executive Chairman of ERI, the nation’s leading fully…
Are WE the firewall?
As we start a new year, let's think about how we can draw up a plan to exercise our cyber fitness and make it a culture that sticks. It's a critical time to get this done as we work toward…
CyberGRX Leverages MITRE Techniques to Uncover Security Gaps in Third Parties
DENVER–(BUSINESS WIRE)–CyberGRX, provider of the world’s first and largest global risk exchange, today announced the availability of a Predictive Data tool to the Exchange platform’s Attack Scenario Analytics feature. Customers can leverage CyberGRX’s predictive risk intelligence capabilities, which has up…
[redacted] Taps Adam Flatley to Lead [rTIC Ghost Group
AUSTIN, Texas–(BUSINESS WIRE)–Redacted, the mission-driven cybersecurity company that levels the playing field against attackers, today announced that Adam Flatley has been promoted to Vice President of Intelligence leading the Redacted Intelligence Cell, recently renamed [rTIC Ghost Group. The team of…
Independent Research Firm Analysis Found 87% Reduction in Time to Resolve Threats with ExtraHop
SEATTLE–(BUSINESS WIRE)–ExtraHop, the leader in cloud-native network detection and response, today announced the results of The Total Economic Impact™ Of ExtraHop Reveal(x) 360. The study, conducted by Forrester Consulting and commissioned by ExtraHop, reveals that a composite organization made up…
TuxCare Unveils OEM Partner Program for Best-in-Class Vulnerability Patching
PALO ALTO, Calif.–(BUSINESS WIRE)–TuxCare, a global innovator in enterprise-grade cybersecurity for Linux, today announced the launch of its TuxCare OEM Partner Program that aims to easily arm OEM partners with its award-winning KernelCare Enterprise and LibCare solutions. OEMs can now…
HUMAN Orchestrates Unprecedented Private Takedown, VASTFLUX
NEW YORK–(BUSINESS WIRE)–HUMAN Security, Inc., the global leader in safeguarding enterprises from digital attacks with modern defense, today announced the takedown of a highly sophisticated ad fraud operation where more than 1,700 apps were spoofed, targeting 120 publishers, running ads…
LATEST CYBERTHREATS AND ADVISORIES – JANUARY 13, 2023
Cybercriminals attack schools, the FCC looks to change data breach rules and artificial intelligence alters the cybersecurity landscape. Here are the latest threats and advisories for the week of January 13, 2023. Threat Advisories and Alerts How Businesses Can Securely…
Improve your AWS security posture, Step 3: Encrypt AWS data in transit and at rest
In the first two blogs in this series, we discussed properly setting up IAM and avoiding direct internet access to AWS resources. In this blog, we’ll tackle encrypting AWS in transit and at rest. Sometimes, despite all efforts to the contrary, data…
Understanding Malware-as-a-Service (MaaS): The future Of cyber attack accessibility
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. With the explosive growth of technology, businesses are…
Ransomware attack on Yum Brands Inc closes 300 restaurants in the UK
Yum Brands Inc, officially the owner of top food chain restaurants KFC, Taco Bell and Pizza Hut, was reportedly hit by a ransomware attack, forcing the IT staff to close about 300 eatery outlets across the United Kingdom. As the…
Microsoft works with partners on Cybercrime Atlas
Microsoft, in association with Fortinet and other partners, is working on mapping cyber crime activities and attain responses to cyber threats on public and private entities. The program was developed in the year 2019 and after a long pause, the…
CloudSEK offers a search engine to detect malicious apps
CloudSEK has developed a new app called BeVigil that can help search malicious apps downloaded on a mobile phone and collect data on what permissions and data they were accessing and processing. All these days, smart phone users were downloading…
ECS Announces Sponsorship with Old Glory DC for 2023 Major League Rugby Season
FAIRFAX, Va.–(BUSINESS WIRE)–ECS, a leader in advanced technology, science, and digital transformation solutions, extends its sponsorship with Old Glory DC, Washington D.C.’s professional rugby team, through the 2023 Major League Rugby (MLR) Season. ECS joins the Old Glory DC family…
Israeli Mission to the UN, Israel’s National Cyber Directorate and Team8, Host Cyber Security Event at UN
NEW YORK–(BUSINESS WIRE)–The Permanent Mission of Israel to the United Nations, in cooperation with Israel’s National Cyber Directorate (INCD) and Team8, hosted a cyber-security event yesterday at the United Nations (UN) to discuss the ways in which countries, governments and…
ERI Opens New State-of-the-Art ITAD & Electronics Recycling Facility in Arizona
GOODYEAR, Ariz.–(BUSINESS WIRE)–ERI, the nation’s largest fully integrated IT and electronics asset disposition (ITAD) provider and cybersecurity-focused hardware destruction company, announced today that due to steadily continued growth, it has opened a new recycling facility in Goodyear, Arizona (near Phoenix)…
CISSP-ISSAPs – We Need Your Input
With more than 150,000 CISSPs around the world, some of you have asked – what's the next step? For many of you, that next step is one of the CISSP concentrations focused on security architecture, engineering or management. The CISSP-ISSAP…
Improve your AWS security posture, Step 2: Avoid direct internet access to AWS resources
In the first blog in this series, we discussed setting up IAM properly. Now we’re moving on to the second step, avoiding direct internet access to AWS resources. When AWS resources like EC2 instances or S3 buckets are directly accessible…
CSI Banking Priorities Executive Report Reveals Bankers Will Deploy Customer-Centric Features for Retention in 2023
PADUCAH, Ky.–(BUSINESS WIRE)–Computer Services, Inc. (CSI), a leading provider of end-to-end fintech and regtech solutions, today released its eighth-annual Banking Priorities Executive Report. The report is based on the company’s yearly research initiative that asks bank representatives to reflect on…
QuSecure Achieves Critical Breakthrough in Post-Quantum Encryption Over Public Internet – Closes Loop for End-to-End Quantum-Safe Data Security
SAN MATEO, Calif.–(BUSINESS WIRE)–QuSecure™, Inc., a leader in post-quantum cybersecurity (PQC), today launched QuEverywhere™, its most recent breakthrough in quantum-safe cryptography orchestration. QuEverywhere is the industry’s first quantum-safe orchestration solution protecting encrypted private data on any website or mobile application…
Latest Cyberthreats and Advisories – December 23, 2022
Ransomware hits hard around the world – again, Cybercriminals steal food and Fortnite’s developer is fined millions. Here are the latest threats and advisories for the week of December 23, 2022. Threat Advisories and Alerts Criminal Actors Use BEC Attacks…
nsKnox Raises $17 Million From Link Ventures, Harel Insurance and Existing Investors Including M12 and Viola Ventures to Meet Growing Demand for B2B Payment Security & Compliance Solutions
NEW YORK–(BUSINESS WIRE)–nsKnox, the global leader in Bank Account Validation and B2B Payment Security, announced today a new funding round of $17 million, bringing its total funding to date to $35.6M. Two new investors, U.S.-based Internet & technology venture capital…
The dos and don’ts of ransomware negotiations
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Has your organization suddenly been attacked by a…
Telephony fraud and risk mitigation: Understanding this ever-changing threat
Telephony fraud is a significant challenge. Companies of all sizes and industries are subjected to the malicious usage of voice and SMS with the intent of committing financial fraud, identity theft, denial-of-service, and a variety of other attacks. Businesses that…
Help Shape the CGRC Exam – Formerly Known As CAP
As practitioners know all too well, it is paramount to remain up to date with the changing landscape of cybersecurity. We regularly conduct Job Task Analysis (JTA) studies to review exam content and outlines to ensure the accuracy, relevance and…
Three easy steps to dramatically improve your AWS security posture: Step 1, set up IAM properly
Have you ever heard the saying that the greatest benefit of the cloud is that limitless resources can be spun-up with just a few clicks of the mouse? If so, you would be best served by forgetting that saying altogether. …
How do the latest iPhone updates address Cybersecurity issues?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Apple is typically known for its minimal design,…
Difference between Cybersecurity and Information Security
Many of you get confused with terms cybersecurity and Information Security and think that both these words are same and synonymous. However, in reality, both these terms are different and confused with one another. Cybersecurity is one of the significant…
Importance of having a Threat Intelligence Platform
First, a Threat Intelligence Platform (TIP) is nothing but a converged form of information aggregating platform that helps an organization gain insights on the latest attack campaigns and treats developing in the current cyber threat landscape. It helps organizations in…
MassChallenge and MITRE Select 10 Startups for the MITRE Social Innovation Mentorship Program
BOSTON–(BUSINESS WIRE)–MassChallenge, in partnership with MITRE, today announced a cohort of 10 startups participating in the MITRE Social Innovation Mentorship Program. The selected companies, all led by founders from under-represented backgrounds, impressed judges with their high-impact, innovative work. The startups’…
Trellix Endpoint Scores 100% Detection with Zero False Positives in Latest SE Labs Endpoint Security Test
SAN JOSE, Calif.–(BUSINESS WIRE)–Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced Trellix Endpoint Security (ENS) earned the highest AAA rating in the SE Labs Endpoint Security (EPS) 2022 Q4 test for both Enterprise…
ERI Becomes First Electronic Recycler & ITAD Company to Achieve Official Carbon Neutral Status
NEW YORK–(BUSINESS WIRE)–ERI, the nation’s largest fully integrated IT and electronics asset disposition (ITAD) provider and cybersecurity-focused hardware destruction company, announced today that it is now 100% carbon neutral for all of its operational emissions nationwide. Through years of dedication…
Hypori, Inc. Secures Series B to Redefine Zero-Trust BYOD
RESTON, Va.–(BUSINESS WIRE)–Hypori, an award-winning SaaS company transforming secure access to data from the edge, announced today the close of an initial $10.5 million Series B investment led by Hale Capital Partners with additional funds from Series A investor GreatPoint…
Latest Cyberthreats and Advisories – January 6, 2023
The LockBit ransomware gang apologizes, Google settles privacy lawsuits and cybercriminals impersonate brands and the U.K. government. Here are the latest threats and advisories for the week of January 6, 2023. Threat Advisories and Alerts Cybercriminals Impersonate Brands with Search…
Key to success while implementing IAM- Best practices that every company should implement
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Identity and access management has emerged as an…
Veeam Research Finds IT Leaders Feel Increasingly Unprotected from Cyberattacks and Other Disasters
COLUMBUS, Ohio–(BUSINESS WIRE)–Veeam® Software, the leader in Modern Data Protection, today released findings of the company’s fourth annual Data Protection Trends Report to better understand how data protection is evolving in a digital world. The survey found that companies are…
GrammaTech and T.E.N. Announce Winner of First Annual Product Security Executive of the Year Award
BETHESDA, Md. & ATLANTA–(BUSINESS WIRE)–GrammaTech, a leading provider of application security testing products and software research services, and T.E.N., founder of the Information Security Executive® (ISE®) of the Year Awards, today announced that Jason Christman, vice president and chief product…
ProArch Acquires Data Protection Firm Trum & Associates
ATLANTA–(BUSINESS WIRE)–ProArch, a global IT consulting and services organization, announced the acquisition of Trum & Associates (Trum), a data protection company with a deep understanding of regulatory compliance headquartered in Destin, Florida. The acquisition expands ProArch’s cybersecurity and governance, risk,…
TD SYNNEX Unveils New Fraud Defense Solution to Combat Widespread Security Risks
FREMONT, Calif. & CLEARWATER, Fla.–(BUSINESS WIRE)–TD SYNNEX (NYSE: SNX) announced today the launch of a new fraud defense solution integrating Microsoft Azure services for small and medium business (SMB) customers during a time of increasing threats within cloud environments. The…
Fiber Broadband Association Opens Fiber Connect 2023 Call for Speakers
WASHINGTON–(BUSINESS WIRE)–The Fiber Broadband Association today announced its Call for Speakers for Fiber Connect 2023 pre-conference workshops and breakout sessions, held August 20-23, at the Gaylord Palms Resort & Convention Center in Kissimmee, Florida. This year’s program theme is “What…
Teleion, a Minority-Owned Business, Selected as Best Place to Work for Third Year
SEATTLE–(BUSINESS WIRE)–For the third consecutive year, Teleion has been selected one of Washington’s 100 Best Companies to Work For by Seattle Business Magazine – for the first time in the large company category. “This year’s recognition is particularly special,” said…
Token Wins Fourth Award for MFA Technology that Stops Phishing and Ransomware
ROCHESTER, N.Y.–(BUSINESS WIRE)–Token, a revolutionary provider of ultra-secure, wearable biometric authentication solutions, today announced that its smart ring that fights cybercrime was just presented with a 2023 BIG Innovation Award from the Business Intelligence Group. In this latest win, Token…
IT/OT convergence and Cybersecurity best practices
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Most of the time, the advantages of technology…
How to say your webcam on laptop or smartphone has been hacked
Most of us who have been gaining knowledge about the current cybersecurity landscape are aware that Facebook founder Mark Zuckerberg covers his laptop with a tape to avoid any prying eyes tracking him down through the webcam. It is learnt…
Policy Brief – U.S. Cyber Threat Intelligence, Part 2: Summary, Recommendations & Challenges
By Aaron Weathersby, CISSP. Aaron is the Chief Information Officer for Charles R. Drew University of Medicine and Science and holds a Doctor of Science in Cyber Security from Marymount University. He is an Information Technology professional with over 18…
(ISC)² Top-Ranked Webinars of 2022 by Region
From fighting the ever-present ransomware threat to securing cloud infrastructures to honing identity management practices, the past year’s showcase of (ISC)² webinar topics was wide-ranging and thought-provoking. A cursory look at the topics we tackled throughout 2022 provides a reflection of…
Cyber Attack news headlines trending on Google
First, is the news that the Indian government has launched its own Mobile Operating systems that have capabilities to take on international rivals like iOS and Android. Within the next few weeks, the government of the sub-continent is preparing to…
Predictions 2023, Part 1: What will the new year bring for the InfoSec Community?
By Diana-Lynn Contesti, CISSP-ISSAP, ISSMP, CSSLP, SSCP In recent years, we have seen the threat landscape become increasingly complex as threat actors use sophisticated techniques to exploit vulnerabilities of weak passwords, missing patches and antiquated software, thus gaining access to…
How to handle personal data of students
School districts are constantly being targeted by cyber attacks, leading to data breaches and information misuse. So, to those who are worried about the privacy of student info, here are some tips to protect it from prying eyes. 1.) Categorization…
(ISC)² New Jersey Chapter Hosts International Event with 500 Attendees
The (ISC)² New Jersey Chapter held their first virtual international event, which hosted more than 20 thought leaders and 500 registered chapter member attendees. The International (ISC)² Chapter Conference, SECON International, took place virtually, on December 1, 2022, and delivered…
Vulnerability puts data of 2.5 billion Chrome users at risk
Data of about 2.5 billion users have been put to risk because of a vulnerability in Google Chrome and chromium browsers. A security firm named Imperva Red has issued a warning that the flaw that has been technically dubbed as…
Megaport and Qrypt demonstrate First of its Kind Global Quantum Secure Data Transmissions
HONOLULU–(BUSINESS WIRE)–Qrypt and Megaport today debuted the ability to transmit data using quantum-secure methods powered by Qrypt quantum key generation technology. Using Megaport’s industry-leading Network as a Service (NaaS) platform, file-sharing applications were launched across several global data centers, including…
Seasons Greetings from (ISC)2
Dear (ISC)² Members, Associates and Candidates: I hope this message finds you well. As 2022 comes to an end, I am grateful for the opportunity to reflect on the past year and all we have achieved together. Launching an entry-level certification…
Syntax Global Report Proves IT Innovation Hinges on Improved Employee Engagement and Experience
MONTREAL–(BUSINESS WIRE)–Syntax, the leading multi-cloud and multi-ERP managed cloud provider for mission-critical applications, today released findings from its newest research report Realizing the Promise of ERP Innovation. The findings showcase how realizing the impact of IT opportunities is dependent on…
Beyond Identity Receives FIDO2 Certification
NEW YORK–(BUSINESS WIRE)–Beyond Identity, the leading provider of passwordless, phishing-resistant MFA, announced today that it has received FIDO2 certification. The company’s advanced authentication platform dramatically simplifies enterprise adoption of standards-based passwordless authentication and phishing-resistant MFA. Beyond Identity extends FIDO2 with…
LATEST CYBERTHREATS AND ADVISORIES – JANUARY 13, 2023
Cybercriminals attack schools, the FCC looks to change data breach rules and artificial intelligence alters the cybersecurity landscape. Here are the latest threats and advisories for the week of January 13, 2023. Threat Advisories and Alerts How Businesses Can Securely…
Five reasons why Cybersecurity training is important in 2023
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The digital world is ever-expanding in scope and…
Cloudflare Wins CISA Contract for Registry and Authoritative Domain Name System (DNS) Services
SAN FRANCISCO–(BUSINESS WIRE)–Cloudflare, Inc. (NYSE: NET), the security, performance, and reliability company helping to build a better Internet, has been awarded a $7.2 million contract from the Cybersecurity and Infrastructure Security Agency (CISA) to provide Registry and Authoritative DNS services…
McNally Capital Announces Investment in Xcelerate Solutions
CHICAGO–(BUSINESS WIRE)–McNally Capital (“McNally”), a lower middle-market private equity firm focused on founder and family-owned businesses, is pleased to announce an investment in Xcelerate Solutions (“Xcelerate”). Xcelerate is a leading defense and national security company, providing integrated solutions delivered through…
Flashpoint Powers Into 2023 Fueled by Transformative Acquisitions, Key C-Level Hires, Customer Growth, and Product Innovations
WASHINGTON–(BUSINESS WIRE)–Flashpoint, the globally trusted leader in risk intelligence and open-source intelligence (OSINT), shares highlights from a landmark 2022, previewing its 2023 outlook for the company and the threat intelligence market. Following multiple acquisitions, pivotal product launches, and impactful leadership…
CTN Solutions Appoints New Advisory Board
BLUE BELL, Pa.–(BUSINESS WIRE)–CTN Solutions has appointed a new advisory board to provide support and guidance to our CEO Drew Morrisroe as our company continues to execute on our growth strategy. Drew Morrisroe, President & CEO, stated, “A key factor…
Understanding Malware-as-a-Service (MaaS): The future Of cyber attack accessibility
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. With the explosive growth of technology, businesses are…
Microsoft introduces voice copying AI tool
Microsoft, the technology giant of America, has achieved a new milestone in Artificial Intelligence by introducing a voice mimicking AI tool dubbed ‘Vall-E’. The tool has enough potential to copy a voice within 3 seconds and can easily create an…
CISSP-ISSAPs – We Need Your Input
With more than 150,000 CISSPs around the world, some of you have asked – what's the next step? For many of you, that next step is one of the CISSP concentrations focused on security architecture, engineering or management. The CISSP-ISSAP…
Cuba Ransomware gang hacking Microsoft Exchange Servers
Microsoft issued a press update that Cuba Ransomware gang were after its exchange servers after exploiting critical server-side request forgery (SSRF) vulnerability. Incidentally, the same flaw is also being exploited by ‘Play’ Ransomware group that hacked into the cloud servers…
Smart TV manufacturing companies withdraw security support after 18 months
Next time when you are planning to buy a Smart TV, please be aware that most reputed manufactures withdraw security support after 12 to 16 months or at the most 18 months. Meaning, the Television gadget touted to be smart…
Wallarm adds Cybersecurity Leaders to its Board of Advisors
SAN FRANCISCO–(BUSINESS WIRE)–Wallarm, the end-to-end API security company, is pleased to introduce the newest cybersecurity luminaries to join the company’s already impressive Board of Advisors. Each new member brings broad and in-depth cybersecurity and business expertise, and are eager to…
Dremio Expands Security Compliance with HIPAA Certification
SANTA CLARA, Calif.–(BUSINESS WIRE)–Dremio, the easy and open data lakehouse, today announced its HIPAA compliance. The company also announced that it has renewed its SOC 2 Type II report, which now includes both Dremio Cloud AND Dremio Software. Dremio meets…
IW’s GRAYPATH, Next-Gen VPN Solution, Aligned with US Army’s Plans to Offset Contested Communications with Multipath Transport Agnostic Capabilities, Awarded Prime Contract from Defense Agency
RESTON, Va.–(BUSINESS WIRE)–Intelligent Waves (IW), a leading IT integrator that delivers mission-focused multi-domain operational expertise and innovation to the Government through high-impact technology solutions, announced today that GRAYPATH, its flagship Next-Gen VPN solution, has been awarded a prime contract with…
Redspin Cybersecurity Experts Selected to Speak at Upcoming CMMC Conference
AUSTIN, Texas–(BUSINESS WIRE)–Redspin, a division of Clearwater and the first organization authorized as a Cybersecurity Maturity Model Certification (CMMC) Third-Party Assessment Organization (C3PAO), announced today that two of its thought leaders will present in multiple sessions at the upcoming CMMC…
Help Shape the CGRC Exam – Formerly Known As CAP
As practitioners know all too well, it is paramount to remain up to date with the changing landscape of cybersecurity. We regularly conduct Job Task Analysis (JTA) studies to review exam content and outlines to ensure the accuracy, relevance and…
Latest Cyberthreats and Advisories – December 23, 2022
Ransomware hits hard around the world – again, Cybercriminals steal food and Fortnite’s developer is fined millions. Here are the latest threats and advisories for the week of December 23, 2022. Threat Advisories and Alerts Criminal Actors Use BEC Attacks…
Are WE the firewall?
As we start a new year, let's think about how we can draw up a plan to exercise our cyber fitness and make it a culture that sticks. It's a critical time to get this done as we work toward…
Healthcare provider issues ransomware alert after 9 months of attack
A healthcare provider from Pennsylvania issued a ransomware alert after 9 months and confirmed that the hackers accessed personal data from its servers and might misuse it anytime. The reason for the delay in informing the affected people is yet…
Cyber Attack on Royal Mail to delay parcels and letter delivery services
Royal Mail, the Britain-based postal and courier delivery services, has made an official statement that a cyber attack affected all its it systems because of which its parcel and letter delivery services will be deeply affected. Thus, those using the…
Hackers lodge war with the Maritime sector by hitting DNV Shipmanager Software
As the maritime sector has become extremely dependent on technology tools, it is also attracting the attention of cyber criminals who are finding it as a lucrative target to mint money. Adding fuel to this are the vulnerabilities being observed…
NTT Joins U.S. Government Public-Private Cybersecurity Initiative JCDC
TOKYO–(BUSINESS WIRE)–NTT Corporation (NTT) is pleased to announce its membership in the Joint Cyber Defense Collaborative (JCDC) to further strengthen the U.S. government focus on cybersecurity and boost resilience internationally. Established by the U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
CrowdStrike Named to Glassdoor’s Best Places to Work in 2023 List
AUSTIN, Texas–(BUSINESS WIRE)–CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced it has been honored with a Glassdoor Employees’ Choice Award, which recognizes the Best Places to Work in 2023. CrowdStrike landed…
Conceal Partners with Thousand Guards to Expand into MSSP Markets
AUGUSTA, Ga.–(BUSINESS WIRE)–Conceal, the leader in protecting against web-based attacks, today announced it is expanding into the Spain, France, Italy, and Portugal MSSP markets through a strategic partnership with Thousand Guards, a Southern European based consulting firm whose mission is…
77 percent of business managers believe their organizations are likely to experience a data breach in the next three years according to survey
NEW YORK–(BUSINESS WIRE)–More than three quarters (77 percent) of IT decision makers across the United States and Canada believe their companies are likely to face a data breach within the next three years according to survey results released today by…
Policy Brief – U.S. Cyber Threat Intelligence, Part 1: Introduction & Background
By Aaron Weathersby, CISSP. Aaron is the Chief Information Officer for Charles R. Drew University of Medicine and Science and holds a Doctor of Science in Cyber Security from Marymount University. He is an Information Technology professional with over 18…
Veracode Research Reveals Steps to Reduce Introduction and Accumulation of Security Flaws as Apps Grow and Age
BURLINGTON, Mass.–(BUSINESS WIRE)–Veracode, a leading global provider of modern application security testing solutions, today revealed data that could save organizations time and money by helping developers minimize the introduction and accumulation of security flaws in their software. The Veracode State…
Policy Brief – U.S. Cyber Threat Intelligence, Part 2: Summary, Recommendations & Challenges
By Aaron Weathersby, CISSP. Aaron is the Chief Information Officer for Charles R. Drew University of Medicine and Science and holds a Doctor of Science in Cyber Security from Marymount University. He is an Information Technology professional with over 18…