Tag: Dark Reading:

Study Points to Lax Focus on Cybersecurity

Despite ranking at the top of respondents’ concerns, organizations still show gaps in acting on cybersecurity, Society for Information Management (SIM) report finds.   Advertise on IT Security News. Read the complete article: Study Points to Lax Focus on Cybersecurity

Operationalizing Threat Intelligence at Scale in the SOC

Open source platforms such as the Malware Information Sharing Platform are well positioned to drive a community-based approach to intelligence sharing.   Advertise on IT Security News. Read the complete article: Operationalizing Threat Intelligence at Scale in the SOC

Rockwell Automation to Buy ICS Security Services Firm

Industrial control systems vendor plans to acquire Avnet Data Security, which provides penetration testing, assessments, training, and managed network and security services for the ICS sector.   Advertise on IT Security News. Read the complete article: Rockwell Automation to Buy…

Developers Still Don’t Properly Handle Sensitive Data

The top classes of vulnerabilities for 2019 indicate that developers still don’t correctly sanitize inputs, nor protect passwords and keys as they should.   Advertise on IT Security News. Read the complete article: Developers Still Don’t Properly Handle Sensitive Data

In App Development, Does No-Code Mean No Security?

No-code and low-code development platforms are part of application development, but there are keys to making sure that they don’t leave security behind with traditional coding.   Advertise on IT Security News. Read the complete article: In App Development, Does…

TikTok Bugs Put Users’ Videos, Personal Data At Risk

Researchers found it was possible to spoof SMS messages from TikTok and exploit an API flaw that could grant access to users’ personal data.   Advertise on IT Security News. Read the complete article: TikTok Bugs Put Users’ Videos, Personal…

The “Art of Cloud War” for Business-Critical Data

How business executives’ best intentions may be negatively affecting security and risk mitigation strategies – and exposing weaknesses in organizational defenses.   Advertise on IT Security News. Read the complete article: The “Art of Cloud War” for Business-Critical Data

DHS Warns of Potential Iranian Cyberattacks

Recent US military action in Baghdad could prompt retaliatory attacks against US organizations, it says.   Advertise on IT Security News. Read the complete article: DHS Warns of Potential Iranian Cyberattacks

Car Hacking Hits the Streets

The top-three carmakers sell only connected vehicles in the United States – and other manufacturers are catching up – creating a massive opportunity for attacks, which black-hat hackers are not overlooking.   Advertise on IT Security News. Read the complete…

Malicious Google Play Apps Linked to SideWinder APT

The active attack involving three malicious Android applications is the first exploiting CVE-2019-2215, Trend Micro researchers report.   Advertise on IT Security News. Read the complete article: Malicious Google Play Apps Linked to SideWinder APT

US Government Publishing Office Website Defaced

The Federal Depository Library Program (FDLP) website was attacked by a group of hackers claiming to represent the government of Iran.   Advertise on IT Security News. Read the complete article: US Government Publishing Office Website Defaced

Mimecast Acquires Segasec to Boost Phishing Defense

Segasec’s technology will be integrated into Mimecast’s email and Web security services to identify malicious domains.   Advertise on IT Security News. Read the complete article: Mimecast Acquires Segasec to Boost Phishing Defense

Client-Side JavaScript Risks & the CCPA

How California’s new privacy law increases the liability for securing Web-facing user data, and what enterprises can do to mitigate their risk.   Advertise on IT Security News. Read the complete article: Client-Side JavaScript Risks & the CCPA

Ransomware Victim Southwire Sues Maze Operators

Attackers demanded $6 million from the wire and cable manufacturer when they launched a December ransomware campaign.   Advertise on IT Security News. Read the complete article: Ransomware Victim Southwire Sues Maze Operators

Edge Feature Section

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a…

CCPA Kickoff: What Businesses Need to Know

The California Consumer Privacy Act is in full effect, prompting organizations to think about how they’ll remain compliant.   Advertise on IT Security News. Read the complete article: CCPA Kickoff: What Businesses Need to Know

Time for Insider-Threat Programs to Grow Up

Immature programs attempting to protect against damaging attacks by insiders run the risk of alienating employees.   Advertise on IT Security News. Read the complete article: Time for Insider-Threat Programs to Grow Up

6 Security Team Goals for DevSecOps in 2020

Huge opportunities await security teams that are finally ready move the needle on security problems that have plagued organizations for years.   Advertise on IT Security News. Read the complete article: 6 Security Team Goals for DevSecOps in 2020