π΄ Wendy Nather on How to Make Security 'Democratization' a Reality π΄
π Read
via "Dark Reading: ".
Ahead of her keynote at the RSA Conference, Cisco's head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users, and start sharing control with them.π Read
via "Dark Reading: ".
Dark Reading
Wendy Nather on How to Make Security 'Democratization' a Reality
Ahead of her keynote at the RSA Conference, Cisco's head of advisory CISOs outlines to Dark Reading a unique paradigm that asks security teams to stop fighting their users -- and start sharing control with them.
π McAfee will acquire Light Point Security to help combat browser-based malware π
π Read
via "Security on TechRepublic".
The acquisition will allow McAfee to integrate browser isolation technology into its Secure Web Gateway product and MVISION Unified Cloud Edge platform.π Read
via "Security on TechRepublic".
TechRepublic
McAfee will acquire Light Point Security to help combat browser-based malware
The acquisition will allow McAfee to integrate browser isolation technology into its Secure Web Gateway product and MVISION Unified Cloud Edge platform.
π Falco 0.20.0 π
π Go!
via "Security Tool Files β Packet Storm".
Sysdig falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about falco as a mix between snort, ossec and strace.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
Falco 0.20.0 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π WhatWeb Scanner 0.5.1 π
π Go!
via "Security Tool Files β Packet Storm".
WhatWeb is a next-generation web scanner. WhatWeb recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more. WhatWeb supports an aggression level to control the trade off between speed and reliability.π Go!
via "Security Tool Files β Packet Storm".
Packetstormsecurity
WhatWeb Scanner 0.5.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
π Why 40% of privacy compliance tech will rely on AI by 2023 π
π Read
via "Security on TechRepublic".
The rise of regulations like GDPR have launched personal data security into the spotlight, and artificial intelligence is here to help.π Read
via "Security on TechRepublic".
TechRepublic
Why 40% of privacy compliance tech will rely on AI by 2023
The rise of regulations like GDPR have launched personal data security into the spotlight, and artificial intelligence is here to help.
π Digital Guardian Unveils New Managed Detection and Response Service π
π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian is pleased to share that effective today, we've launched a new Managed Detection & Response (MDR) service to better help customers secure their most sensitive data.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Digital Guardian Unveils New Managed Detection and Response Service
Digital Guardian is pleased to share that effective today, we've launched a new Managed Detection & Response (MDR) service to better help customers secure their most sensitive data.
β Google stops indexing WhatsApp chats; other search engines still at it β
π Read
via "Naked Security".
Private chat invites aren't meant to be unfindable, Facebook says, though a snippet of code eventually shielded them from Google indexing.π Read
via "Naked Security".
Naked Security
Google stops indexing WhatsApp chats; other search engines still at it
Private chat invites arenβt meant to be unfindable, Facebook says, though a snippet of code eventually shielded them from Google indexing.
β Android 11 to clamp down on background location access β
π Read
via "Naked Security".
Is Android finally about to get on top of the issue of apps that quietly suck up location data?π Read
via "Naked Security".
Naked Security
Android 11 to clamp down on background location access
Is Android finally about to get on top of the issue of apps that quietly suck up location data?
π How to hack an election without touching a voting machine π
π Read
via "Security on TechRepublic".
In a RSA 2020 simulation, the Red Team compromised email accounts, deepfake videos, and disinformation on Election Day in Adversaria.π Read
via "Security on TechRepublic".
TechRepublic
How to hack an election without touching a voting machine
In a RSA 2020 simulation, the Red Team compromised email accounts, deepfake videos, and disinformation on Election Day in Adversaria.
β RSAC 2020 Keynote: Changing the Worldβs False Perception of Cybersecurity β
π Read
via "Threatpost".
The reality of the cybersecurity industry is starkly different than what's perceived by the rest of the world.π Read
via "Threatpost".
Threat Post
RSAC 2020 Keynote: Changing the Worldβs False Perception of Cybersecurity
RSA Conference kicked off with RSA's president reminding of the importance of the humans who play a role in the industry.
π΄ Google Adds More Security Features Via Chronicle Division π΄
π Read
via "Dark Reading: ".
Order out of chaos? The saga of Chronicle continues with new security features for the Google Cloud Platform.π Read
via "Dark Reading: ".
Dark Reading
Google Adds More Security Features Via Chronicle Division
Order out of chaos? The saga of Chronicle continues with new security features for the Google Cloud Platform.
π΄ Ensure Your Cloud Security Is as Modern as Your Business π΄
π Read
via "Dark Reading: ".
Take a comprehensive approach to better protect your organization. Security hygiene is a must, but also look at your risk posture through a data protection lens.π Read
via "Dark Reading: ".
Darkreading
Ensure Your Cloud Security Is as Modern as Your Business
Take a comprehensive approach to better protect your organization. Security hygiene is a must, but also look at your risk posture through a data protection lens.
β Google Patches Chrome Browser Zero-Day Bug, Under Attack β
π Read
via "Threatpost".
Google patches zero-day bug tied to memory corruptions found inside the Chrome browser's open-source JavaScript and Web Assembly engine, called V8.π Read
via "Threatpost".
Threat Post
Google Patches Chrome Browser Zero-Day Bug, Under Attack
Google patches zero-day bug tied to memory corruptions found inside the Chrome browser's open-source JavaScript and Web Assembly engine, called V8.
π RSA president: Hackers have broken into our brains and created the wrong security story π
π Read
via "Security on TechRepublic".
Security professionals need to stop being snobs to solve the talent gap and improve problem-solving skills.π Read
via "Security on TechRepublic".
TechRepublic
RSA president: Hackers have broken into our brains and created the wrong security story
Security professionals need to stop being snobs to solve the talent gap and improve problem-solving skills.
β RSAC 2020: Blockchain is βGarbage Inβ, Voting Needs Paper Ballots β
π Read
via "Threatpost".
The annual cryptographer's panel took on issues of privacy and how new crypto-technologies apply to it in today's digital world.π Read
via "Threatpost".
Threat Post
RSAC 2020: Blockchain is βGarbage Inβ, Voting Needs Paper Ballots
The annual cryptographer's panel took on issues of privacy and how new crypto-technologies apply to it in today's digital world.
ATENTIONβΌ New - CVE-2015-0565
π Read
via "National Vulnerability Database".
NaCl in 2015 allowed the CLFLUSH instruction, making rowhammer attacks possible.π Read
via "National Vulnerability Database".
β Mystery zero-day in Chrome β update now! β
π Read
via "Naked Security".
When a bug's a zero-day that means it's being actively exploited. So don't delay, just patch today!π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
π Bitcoin ATMs: Security, demographics, transaction fees, and other details π
π Read
via "Security on TechRepublic".
Coinsource now offers ATMs that customers can use to manage their Bitcoin.π Read
via "Security on TechRepublic".
TechRepublic
Bitcoin ATMs: Security, demographics, transaction fees, and other details
Coinsource now offers ATMs that customers can use to manage their Bitcoin.
π How to create a Linux user that cannot log in π
π Read
via "Security on TechRepublic".
For security reasons, you might need to create a Linux user without the ability to log in. Jack Wallen shows you how.π Read
via "Security on TechRepublic".
TechRepublic
How to create a Linux user that cannot log in
For security reasons, you might need to create a Linux user without the ability to log in. Jack Wallen shows you how.
π΄ Report: Shadow IoT Emerging as New Enterprise Security Problem π΄
π Read
via "Dark Reading: ".
Much of the traffic egressing enterprise networks are from poorly protected Internet-connected consumer devices, a Zscaler study finds.π Read
via "Dark Reading: ".
Dark Reading
Report: Shadow IoT Emerging as New Enterprise Security Problem
Much of the traffic egressing enterprise networks are from poorly protected Internet-connected consumer devices, a Zscaler study finds.