Existing controls are often not configured properly or deployed widely, allowing bad actors to steal data. Advertise on IT Security News. Read the complete article: CrowdStrike’s 2020 Threat Report: Spammers finetune email thread hijacking
Tag: Security on TechRepublic
The latest cancellations: How the coronavirus is disrupting tech conferences worldwide
Adobe Summit 2020 is the latest to cancel as tech trade shows around the globe are impacted by the coronavirus. GDD and F5 Agility are history, and Twitter pulls out of SXSW. Advertise on IT Security News. Read the…
Report: Coronavirus is negatively impacting international call quality
When entire regions are quarantined, home-bound people are overloading local switches, reducing international call quality and interrupting connectivity. Advertise on IT Security News. Read the complete article: Report: Coronavirus is negatively impacting international call quality
Morphisec is using the Windows 10 transition to help companies boost security
Morphisec combines the anti-virus protection in the new Microsoft OS with its own defenses against malware. Advertise on IT Security News. Read the complete article: Morphisec is using the Windows 10 transition to help companies boost security
Phishing: Leading targets, breaking myths, and educating users
Vade Secure’s Adrien Gendre explains why the end user is an important link in the security chain. Advertise on IT Security News. Read the complete article: Phishing: Leading targets, breaking myths, and educating users
Fraud alert: Voice authentication platform analyzes 1,380 data points per call
Pindrop’s dashboard scores the caller, the device, and the behavior to spot bad actors and authentic customers. Advertise on IT Security News. Read the complete article: Fraud alert: Voice authentication platform analyzes 1,380 data points per call
Coronavirus: How hackers are exploiting the epidemic to steal your information
Karen Roby interviewed a cybersecurity expert about a different threat than COVID-19 brings. Advertise on IT Security News. Read the complete article: Coronavirus: How hackers are exploiting the epidemic to steal your information
How to install and use the open source OTPClient 2FA tool on Linux
If your desktop of choice is Linux, you don’t have to be without a 2FA tool, thanks to OTPClient. Advertise on IT Security News. Read the complete article: How to install and use the open source OTPClient 2FA tool…
Infosys CISO: Being good at technology is no longer enough
Vishal Salvi says investing time and developing influence are the keys to making the shift to a secure-by-design mindset. Advertise on IT Security News. Read the complete article: Infosys CISO: Being good at technology is no longer enough
5 top 5G trends for 2020
This year will be a big investment year for 5G for many manufacturers and network operators. Find out what the experts predict will happen next. Advertise on IT Security News. Read the complete article: 5 top 5G trends for…
How organizations are misusing firewalls (and what IT teams should do about it)
Firewall management doesn’t mean set it and forget it. Learn tips for effective firewall configuration to protect your organization from security risks and threats. Advertise on IT Security News. Read the complete article: How organizations are misusing firewalls (and…
Don’t be like Bezos: How to keep your phone from being hacked
Anyone can be a target of a Jeff Bezos-level data hack. Here’s how to keep your phone protected. Advertise on IT Security News. Read the complete article: Don’t be like Bezos: How to keep your phone from being hacked
GM prioritizes cybersecurity with internal training and bug bounties
CEO Mary Barra shared the company’s commitment to security at RSA 2020. Advertise on IT Security News. Read the complete article: GM prioritizes cybersecurity with internal training and bug bounties
RSA CTO outlines pitfalls to avoid when operationalizing AI
Assembling strong data sets and developing domain expertise are more important than choosing an algorithm. Advertise on IT Security News. Read the complete article: RSA CTO outlines pitfalls to avoid when operationalizing AI
Open Cybersecurity Alliance looks for new members and new projects at RSA 2020
New standards project aims to make it easy to integrate multiple security tools. Advertise on IT Security News. Read the complete article: Open Cybersecurity Alliance looks for new members and new projects at RSA 2020
After DISA breach, experts say US agencies must stop lateral movement of hackers
Attackers shouldn’t have been able to remove sensitive data like Social Security numbers from military networks, according to cybersecurity experts. Advertise on IT Security News. Read the complete article: After DISA breach, experts say US agencies must stop lateral…
Egress mail security platform aims to stop insider breaches
Machine learning creates a profile of expected email contacts and turns on a stop sign when new people pop up. Advertise on IT Security News. Read the complete article: Egress mail security platform aims to stop insider breaches
Facebook cancels F8: How the coronavirus is disrupting tech conferences worldwide
Verizon is the latest to withdraw from the RSA conference in San Francisco as tech trade shows around the globe are impacted by novel coronavirus (COVID-19). Here’s what you need to know. Advertise on IT Security News. Read the…
How to make high security standards a competitive advantage
Security firm specializes in secure cloud architecture and penetration testing. Advertise on IT Security News. Read the complete article: How to make high security standards a competitive advantage
Cloud misconfigurations are a new risk for the enterprise
Cybersecurity is an imperfect science, similar to infectious disease control, according to McAfee CTO. Advertise on IT Security News. Read the complete article: Cloud misconfigurations are a new risk for the enterprise
How cybercriminals target organizations with new and old security threats
Spam, ransomware, and malware continue to haunt organizations, but bad actors are also cooking up new spins on these tried-and-true methods, according to security company Fortinet. Advertise on IT Security News. Read the complete article: How cybercriminals target organizations…
UK company takes retro approach to security
Garrison wants to move security away from software and into hardware Advertise on IT Security News. Read the complete article: UK company takes retro approach to security
How the coronavirus is disrupting tech conferences worldwide
Verizon is the latest to withdraw from the RSA conference in San Francisco as tech trade shows around the globe are impacted by novel coronavirus (COVID-19). Here’s what you need to know. Advertise on IT Security News. Read the…
Why city and state governments may be unprepared for ransomware attacks
Despite the rise in ransomware, a lack of prevention training and stagnant security budgets are putting local governments at risk, according to IBM Security. Advertise on IT Security News. Read the complete article: Why city and state governments may…
RSA: What it’s like to attend a tech conference during the coronavirus epidemic
San Francisco is the site of the RSA 2020 conference, which took place despite cancellations from IBM, Verizon and AT&T. Advertise on IT Security News. Read the complete article: RSA: What it’s like to attend a tech conference during…
RSA: What it’s like to attend the first tech conference after the coronavirus epidemic
San Francisco is the site of the RSA 2020 conference, which took place despite cancellations from IBM, Verizon and AT&T. Advertise on IT Security News. Read the complete article: RSA: What it’s like to attend the first tech conference…
RSA Red Team exercise highlights election threats from deepfakes and fake news
In a RSA 2020 simulation, the Red Team compromised email accounts, created deepfake videos and spread disinformation on Election Day in Adversaria. Advertise on IT Security News. Read the complete article: RSA Red Team exercise highlights election threats from…
Bitcoin ATMs: Security, demographics, transaction fees, and other details
Coinsource now offers ATMs that customers can use to manage their Bitcoin. Advertise on IT Security News. Read the complete article: Bitcoin ATMs: Security, demographics, transaction fees, and other details
How to create a Linux user that cannot log in
For security reasons, you might need to create a Linux user without the ability to log in. Jack Wallen shows you how. Advertise on IT Security News. Read the complete article: How to create a Linux user that cannot…
RSA president: Hackers have broken into our brains and created the wrong security story
Security professionals need to stop being snobs to solve the talent gap and improve problem-solving skills. Advertise on IT Security News. Read the complete article: RSA president: Hackers have broken into our brains and created the wrong security story
How to hack an election without touching a voting machine
In a RSA 2020 simulation, the Red Team compromised email accounts, deepfake videos, and disinformation on Election Day in Adversaria. Advertise on IT Security News. Read the complete article: How to hack an election without touching a voting machine
Why 40% of privacy compliance tech will rely on AI by 2023
The rise of regulations like GDPR have launched personal data security into the spotlight, and artificial intelligence is here to help. Advertise on IT Security News. Read the complete article: Why 40% of privacy compliance tech will rely on…
McAfee will acquire Light Point Security to help combat browser-based malware
The acquisition will allow McAfee to integrate browser isolation technology into its Secure Web Gateway product and MVISION Unified Cloud Edge platform. Advertise on IT Security News. Read the complete article: McAfee will acquire Light Point Security to help…
Smishing, data theft by directors, and a new mental health focus
Security researchers and practitioners will be talking about a surge in SMS-based phishing attacks, the threat employees pose to data security, and how to improve health and wellness on security team members. Advertise on IT Security News. Read the…
3D map shows how the coronavirus is spreading worldwide
A UN aviation agency uses GIS software to track transmission lines while 20 US airports set up screening centers. Advertise on IT Security News. Read the complete article: 3D map shows how the coronavirus is spreading worldwide
Google reveals new cloud security features at RSA 2020
Google’s reCAPTCHA Enterprise and Web Risk API get a general release; Chronicle Security gets boosts from new threat detection and timelining features. Advertise on IT Security News. Read the complete article: Google reveals new cloud security features at RSA…
Financial services companies are ahead in hybrid cloud deployments
But 73% of financial companies are moving applications off the cloud and back on premises. Advertise on IT Security News. Read the complete article: Financial services companies are ahead in hybrid cloud deployments
Summer Olympics is ripe for cyberattacks
Criminals will exploit the confusion and hustle and bustle of the games to their advantage, according to security researcher. Advertise on IT Security News. Read the complete article: Summer Olympics is ripe for cyberattacks
Three things CISOs need to do differently in 2020
Security leaders need to connect their work to broader business goals and create a culture of learning to attract talent. Advertise on IT Security News. Read the complete article: Three things CISOs need to do differently in 2020
16 best practices for improving cybersecurity
Cisco’s 2020 CISO Benchmark Study links a robust patch policy and collaboration to smaller data breaches. Advertise on IT Security News. Read the complete article: 16 best practices for improving cybersecurity
The good, the bad, and the scary from Experian’s data breach report
Many security teams don’t update response plans on a regular basis but complying with GDPR is getting easier. Advertise on IT Security News. Read the complete article: The good, the bad, and the scary from Experian’s data breach report
MGM Hotel breach highlights need for sophisticated cloud security
Cybercriminals posted the information of more than 10 million customers on a hacker forum a year after the initial attack on a cloud server. Advertise on IT Security News. Read the complete article: MGM Hotel breach highlights need for…
5 best practices for IIoT project success
Based on years of pilot projects and proofs-of-concept, the Industrial Internet Consortium has detailed the best-practices organizations can use to ensure successful deployments. Advertise on IT Security News. Read the complete article: 5 best practices for IIoT project success
70% of IT leaders say security concerns restrict adoption of public cloud
While the concerns are legitimate, Barracuda also wants IT professionals to know that practical solutions exist. Advertise on IT Security News. Read the complete article: 70% of IT leaders say security concerns restrict adoption of public cloud
92% of Americans would delete an app that sold their personal information
Smartphone users don’t want government encryption backdoors and would rather read “terms and conditions” than watch the movie “Cats.” Advertise on IT Security News. Read the complete article: 92% of Americans would delete an app that sold their personal…
Verizon bails on RSA: How the coronavirus is disrupting tech conferences worldwide
Verizon is the latest to withdraw from the RSA conference in San Francisco as tech trade shows around the globe are impacted by the Novel Coronavirus (COVID-19). Here’s what you need to know. Advertise on IT Security News. Read…
11 things you might not know about security operations center burnout
Managers and industry leaders are beginning to address mental health in the IT world – and here are symptoms to look for and solutions to try. Advertise on IT Security News. Read the complete article: 11 things you might…
Compliance: Veritas tool adds intelligence and analysis to data supervision
A new release leverages machine learning to help companies reduce the search time they need to remain compliant in regulated industries. Advertise on IT Security News. Read the complete article: Compliance: Veritas tool adds intelligence and analysis to data…
AT&T bails on RSA: How the coronavirus is disrupting tech conferences worldwide
RSA, MWC and Facebook are the latest tech trade shows impacted by the Novel Coronavirus (COVID-19). Here’s what you need to know. Advertise on IT Security News. Read the complete article: AT&T bails on RSA: How the coronavirus is…
How to use Restricted Shell to limit user access to a Linux system
Learn how to prevent Linux users from executing certain commands and confining them to their home directory by employing rbash. Advertise on IT Security News. Read the complete article: How to use Restricted Shell to limit user access to…
5 free security apps to keep your Mac safe
Mac users, check out these five antivirus software options, which includes one antimalware app that is ideal for SMBs. Advertise on IT Security News. Read the complete article: 5 free security apps to keep your Mac safe
Security platform tracks rogue wireless devices via real-time map
New security tool from Bastille Networks can help security teams enforce no cell-phone zones. Advertise on IT Security News. Read the complete article: Security platform tracks rogue wireless devices via real-time map
How Shadow IT could put your organization at risk
Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password. Advertise on IT Security News. Read the complete article: How Shadow IT could put your organization at risk
How some presidential campaigns use DMARC to protect their domains from being spoofed
DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail. Advertise on IT Security News. Read the complete article:…
Cloud misconfigurations cost companies nearly $5 trillion
A DivvyCloud report finds 196 data breaches exposed more than 33 billion records due to environments without appropriate security. Advertise on IT Security News. Read the complete article: Cloud misconfigurations cost companies nearly $5 trillion
Data privacy: What consumers want businesses to know
A new PwC report reveals what customers expect when it comes to expectations of privacy surrounding their data. Advertise on IT Security News. Read the complete article: Data privacy: What consumers want businesses to know
Security holes in 2G and 3G networks will pose a risk for next several years
Despite the growth of 5G and 4G, older network technologies beset with certain security flaws will be around for many more years, says enterprise security provider Positive Technologies. Advertise on IT Security News. Read the complete article: Security holes…
Cybercriminals get creative with tax scams ahead of April 15
Hackers are going after everyone this tax season, including the companies handling our most sensitive information. Advertise on IT Security News. Read the complete article: Cybercriminals get creative with tax scams ahead of April 15
Insider data breach survey finds directors most likely to break company policy
Report suggests IT leaders think breaches are inevitable and don’t have adequate risk management in place. Advertise on IT Security News. Read the complete article: Insider data breach survey finds directors most likely to break company policy
Coronavirus domain names are the latest hacker trick
One site registered in Russia offers a coronavirus cure for $300. Advertise on IT Security News. Read the complete article: Coronavirus domain names are the latest hacker trick
How to manage security and privacy in the new Microsoft Edge browser
There’s a new version of Microsoft Edge in town based on Chromium. Here’s how to manage the browser’s security and privacy settings. Advertise on IT Security News. Read the complete article: How to manage security and privacy in the…
Finally, the world is getting concerned about data privacy
Consumers and employees are finally becoming more sensitive to the privacy of their data. As technology leaders it’s worth getting ahead of this trend. Advertise on IT Security News. Read the complete article: Finally, the world is getting concerned…
Is your firmware vulnerable to attack? A report says it might be
Unsigned firmware in WiFi adapters, USB hubs, trackpads, and other devices can be compromised by hackers, says enterprise firmware security company Eclypsium in a new report. Advertise on IT Security News. Read the complete article: Is your firmware vulnerable…
Mac attacks on the rise
Cyberattacks on Mac endpoints nearly doubled over those on Windows for the first time, according to the 2020 State of Malware Report. Advertise on IT Security News. Read the complete article: Mac attacks on the rise
Python, microservices, and more tech trends for 2020, according to O’Reilly
Interest in Kubernetes is increasing, and DevOps is losing steam, based on O’Reilly survey findings. Advertise on IT Security News. Read the complete article: Python, microservices, and more tech trends for 2020, according to O’Reilly
How to report a phishing or spam email to Microsoft
Microsoft can analyze dangerous emails to determine why those messages made it past your spam filters. Advertise on IT Security News. Read the complete article: How to report a phishing or spam email to Microsoft
Voatz defends blockchain solution for its voting via app
The for-profit company wants to make absentee voting easier for members of the military, people with disabilities, and older adults, but its biggest test included only 15,000 voters. Advertise on IT Security News. Read the complete article: Voatz defends…
MIT finds massive security flaws with blockchain voting app
Researchers say hackers can alter, stop, or expose how an individual user has voted through the Voatz app. Advertise on IT Security News. Read the complete article: MIT finds massive security flaws with blockchain voting app
Voatz defends its blockchain solution for voting via app
The for-profit company wants to make absentee voting easier, but its biggest test included only 15,000 voters. Advertise on IT Security News. Read the complete article: Voatz defends its blockchain solution for voting via app
Cybercriminals flooding the web with coronavirus-themed spam and malware
Hackers have expanded their exploitation of the outbreak fears with hundreds of scams and operations. Advertise on IT Security News. Read the complete article: Cybercriminals flooding the web with coronavirus-themed spam and malware
Cybercriminals flooding web with coronavirus-themed spam and malware
Hackers have expanded their exploitation of the outbreak fears with hundreds of scams and operations. Advertise on IT Security News. Read the complete article: Cybercriminals flooding web with coronavirus-themed spam and malware
How banks can protect their customers from coronavirus-themed phishing emails
The coronavirus, which has already led to the deaths of more than 1,000 people, is a topic that scammers are corrupting for their own purposes. Advertise on IT Security News. Read the complete article: How banks can protect their…
Android facial recognition is more secure than you think
After running real-world tests of Android’s facial recognition on a Pixel 4, Jack Wallen shares his theory of why some people are so concerned about facial recognition. Advertise on IT Security News. Read the complete article: Android facial recognition…
Man tries to sell Jimmy Wales on blockchain for Wikipedia’s security problems–Wales doesn’t buy it
Commentary: It takes a certain amount of hubris to tell Jimmy Wales, the founder of Wikipedia, how to store data. Advertise on IT Security News. Read the complete article: Man tries to sell Jimmy Wales on blockchain for Wikipedia’s…
Key components of the CEO’s agenda for the digital enterprise
CEOs are generally from a finance/business track, rather than a technology one–why their traditional agenda and practices must change. Advertise on IT Security News. Read the complete article: Key components of the CEO’s agenda for the digital enterprise
IoT device security: 5 tips for enterprises
There are now billions of IoT devices in businesses across the world, prompting the need for increased security measures to protect them. Advertise on IT Security News. Read the complete article: IoT device security: 5 tips for enterprises
Report: 9 times out of 10, hackers can attack website visitors
A Positive Technologies study finds 82% of web application vulnerabilities lie in the source code. Advertise on IT Security News. Read the complete article: Report: 9 times out of 10, hackers can attack website visitors
Only 17% of global organizations are considered cyber resilience “leaders”
New Accenture study says organizations need to think beyond securing just their own enterprises and take better steps to secure their vendor ecosystems. Advertise on IT Security News. Read the complete article: Only 17% of global organizations are considered…
Chinese cyber criminals are getting more organized and dangerous
Hackers are adopting organized crime tactics to make billions from victims all over the globe. Advertise on IT Security News. Read the complete article: Chinese cyber criminals are getting more organized and dangerous
Why password management is critical to mitigating data breaches
The Identity Theft Resource Center warns that businesses of all sizes should be vigilant about data security. The COO offers advice about passwords, cloud security, and patch management. Advertise on IT Security News. Read the complete article: Why password…
Data breaches up 17% in 2019 over previous year
The Identity Theft Recource Center warns that businesses of all sizes should be vigilant about data security. Advertise on IT Security News. Read the complete article: Data breaches up 17% in 2019 over previous year
Cloud computing security: These two Microsoft tools can help you battle shadow IT
Finding what cloud services employees are using is only half the battle: integrating Microsoft Cloud App Security and Defender Advanced Threat Protection means you can track, block or audit cloud app usage. Advertise on IT Security News. Read the…
How to gain more control over DNS with NextDNS: 5 steps
As an alternative to an on-site DNS server, this cloud-hosted DNS service lets you block, filter, and analyze activity across your network and devices. Advertise on IT Security News. Read the complete article: How to gain more control over…
51% say automation will result in job loss for IT security pros
Security automation will reshape hiring trends in both the US and the UK, according to a new report. Advertise on IT Security News. Read the complete article: 51% say automation will result in job loss for IT security pros
Security and disaster recovery are priorities when choosing data center provider
Security and compliance are key factors to consider when outsourcing your data center, according to a report from data center provider US Signal. Advertise on IT Security News. Read the complete article: Security and disaster recovery are priorities when…
PayPal tops the list of most impersonated brand in phishing attacks
Facebook impersonations came in second place among phishing campaigns, followed by Microsoft, said email security firm Vade Secure. Advertise on IT Security News. Read the complete article: PayPal tops the list of most impersonated brand in phishing attacks
IBM X-Force Threat Index finds Google, Apple, Amazon are most often spoofed
Attacks on industrial control systems are up and code for banking trojans and ransomware is evolving the fastest. Advertise on IT Security News. Read the complete article: IBM X-Force Threat Index finds Google, Apple, Amazon are most often spoofed
Kubernetes rollouts: 5 security best practices
If you don’t follow these Kubernetes deployments security best practices from Portshift, your containers, their underlying technologies, and your data could be at risk. Advertise on IT Security News. Read the complete article: Kubernetes rollouts: 5 security best practices
13 tips to avoid Valentine’s Day online romance scams
Scammers use dating sites to try to build relationships with people to get money or personal information. Here are 13 tips to protect yourself. Advertise on IT Security News. Read the complete article: 13 tips to avoid Valentine’s Day…
How some presidential campaigns use DMARC to protect their domains from being spoofed
DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail. Advertise on IT Security News. Read the complete article:…
Global shipping industry attacked by coronavirus-themed malware
Hackers are using malicious emails about the coronavirus to trick people with a malware called AZORult. Advertise on IT Security News. Read the complete article: Global shipping industry attacked by coronavirus-themed malware
How to protect your privacy on an iOS device
Learn how to keep your iOS devices–and your data–secure with these iOS 13 privacy settings and Apple resources. Advertise on IT Security News. Read the complete article: How to protect your privacy on an iOS device
Hackers imitating CDC, WHO with coronavirus phishing emails
Cybercriminals are now using fears over the outbreak to steal email credentials, security officials say. Advertise on IT Security News. Read the complete article: Hackers imitating CDC, WHO with coronavirus phishing emails
How Shadow IT could put your organization at risk
Employees who create external accounts but use them internally pose a risk to your security, says password manager company 1Password. Advertise on IT Security News. Read the complete article: How Shadow IT could put your organization at risk
How to use 7zip to encrypt files
If you need strong command line encryption on Linux, look no further than 7zip. Advertise on IT Security News. Read the complete article: How to use 7zip to encrypt files
Why shortcuts lead to failure: Lessons from app disaster in Iowa caucus
Quality control and standard software dev process could have prevented extended delays in reporting the results of the 2020 Iowa Caucus. Advertise on IT Security News. Read the complete article: Why shortcuts lead to failure: Lessons from app disaster…
The postmortem: Shadow took lots of shortcuts with Iowa 2020 caucus app
Extreme delays in reporting results shows “move fast and break things” is the wrong approach for election infrastructure, developers and business leaders say. Advertise on IT Security News. Read the complete article: The postmortem: Shadow took lots of shortcuts…
Why shortcuts lead to failure: Lessons from app disaster in Iowa
Quality control and standard software dev process could have prevented extended delays in reporting the results of the 2020 Iowa Caucus. Advertise on IT Security News. Read the complete article: Why shortcuts lead to failure: Lessons from app disaster…
Beware of malware disguised as Oscar-nominated movies including Joker and Parasite
Joker was the hottest film among cybercriminals with 304 malicious files named after Batman’s arch-nemesis, says security firm Kaspersky. Advertise on IT Security News. Read the complete article: Beware of malware disguised as Oscar-nominated movies including Joker and Parasite
IoT is a gold mine for hackers using fileless malware for cyberattacks
Data exposure is one of the biggest threats from attacks on IoT devices. A new report recommends a shift to perimeter-less security strategies. Advertise on IT Security News. Read the complete article: IoT is a gold mine for hackers…