Tag: EN

Best 5 SOC 2 Compliance Software in 2024

If you’ve landed here, chances are you know just how challenging getting SOC 2 certification can be. Dealing with manual processes, spreadsheets, and endless piles of documentation can feel like a never-ending battle.  I get it—it’s overwhelming and inefficient. In…

Cencora Confirms Patient Data Stolen in Cyber-Attack

Pharma company Cencora confirmed in an updated SEC filing that sensitive personal and health data was exfiltrated by attackers in a February 2024 incident This article has been indexed from www.infosecurity-magazine.com Read the original article: Cencora Confirms Patient Data Stolen…

What Is a Field CISO?

We’re increasingly seeing the industry fill up with Field CISOs. Why is the CISO out in the field? What does that role entail? Check out this post for the discussion […] The post What Is a Field CISO? appeared first…

Get an Extensive Education in Cybersecurity for Just $40

This extensive bundle includes nine courses and more than 50 hours of training in ethical hacking, Kali Linux, certification exams, and more. This article has been indexed from Security | TechRepublic Read the original article: Get an Extensive Education in…

E-Commerce Fraud Campaign Uses 600+ Fake Sites

The “Eriakos” info-stealing campaign is using hundreds of fake web shops to defraud victims This article has been indexed from www.infosecurity-magazine.com Read the original article: E-Commerce Fraud Campaign Uses 600+ Fake Sites

Where to find Talos at BlackHat 2024

This year marks the 10th anniversary of Cisco Talos, as the Talos brand was officially launched in August 2014 at Black Hat. This article has been indexed from Cisco Talos Blog Read the original article: Where to find Talos at…

Synack PTaaS platform offers complete security testing suite

Synack has unveiled additional capabilities of its Penetration Testing as a Service (PTaaS) platform that deliver a comprehensive security testing experience. The Synack platform now covers all customers’ security testing needs, from attack surface discovery and analytics to penetration testing…

Threat Actor Impersonates Google via Fake Ads for Authenticator

A threat actor recently impersonated Google through a fake ad for the Google Authenticator, a popular multi-factor authentication program. This resulted in innocent users unknowingly downloading malware or falling victim to phishing scams. This article has been indexed from Cyware…