Tag: EN

Cloud security training: Build secure cloud systems

The cloud’s potential is undeniable – but securing it remains a daunting challenge. A recent SC Magazine survey revealed a troubling statistic: one in four companies cite a critical cloud security skills gap. This gap leaves organizations vulnerable, as attackers…

CISA’s OT Attack Response Team Understaffed: GAO

GAO study finds that CISA does not have enough staff to respond to significant OT attacks in multiple locations at the same time. The post CISA’s OT Attack Response Team Understaffed: GAO appeared first on SecurityWeek. This article has been…

EquiLend Ransomware Attack Leads to Data Breach

EquiLend is informing its employees that their personal information was compromised in a January ransomware attack. The post EquiLend Ransomware Attack Leads to Data Breach  appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the…

Read the Latest NIST Cybersecurity Framework Updates

This blog reviews NIST cybersecurity framework 2.0 updates, and the difference between the CSF and NIST’s data privacy framework. The post Read the Latest NIST Cybersecurity Framework Updates appeared first on Security Boulevard. This article has been indexed from Security…

Rubrik EPE secures enterprise data from cyberattacks

Artificial intelligence (AI), digital transformation, and the Internet of Things have caused a data explosion, leading organizations to grapple with a surging amount of fragmented data where it lives. Rubrik released Rubrik Enterprise Proactive Edition (EPE), a data security product…

VCURMS: A Simple and Functional Weapon

ForitGuard Labs uncovers a rat VCURMS weapon and STRRAT in a phishing campaign. Learn more.        This article has been indexed from Fortinet Threat Research Blog Read the original article: VCURMS: A Simple and Functional Weapon

Mitigating Lurking Threats in the Software Supply Chain

The first step to addressing software supply chain vulnerabilities and threats is to understand the most common attacks. Here’s where to start. The post Mitigating Lurking Threats in the Software Supply Chain appeared first on Security Boulevard. This article has…

Three-Quarters of Cyber Incident Victims Are Small Businesses

Three-quarters of cyber-incidents Sophos responded to involved small businesses in 2023, with attackers’ main goal being data theft This article has been indexed from www.infosecurity-magazine.com Read the original article: Three-Quarters of Cyber Incident Victims Are Small Businesses