π΄ Critical Encryption Bypass Flaws in Popular SSDs Compromise Data Security π΄
π Read
via "Dark Reading: ".
Vulnerabilities in Samsung, Crucial storage devices enable data recovery without a password or decryption key, researchers reveal.π Read
via "Dark Reading: ".
Dark Reading
Critical Encryption Bypass Flaws in Popular SSDs Compromise Data Security
Vulnerabilities in Samsung, Crucial storage devices enable data recovery without a password or decryption key, researchers reveal.
π΄ Why the CISSP Remains Relevant to Cybersecurity After 28 Years π΄
π Read
via "Dark Reading: ".
π Read
via "Dark Reading: ".
Dark Reading
Why the CISSP Remains Relevant to Cybersecurity After 28 Years - Dark Reading
The venerable Certified Information Systems Security Professional certification has been around for a very long time -- and for good reason.
β ThreatList: Despite Fraud Awareness, Password Reuse Persists for Half of U.S. Consumers β
π Read
via "The first stop for security news | Threatpost ".
One-third of respondents in a new poll said that have been a victim of fraud or identity theft in the past.π Read
via "The first stop for security news | Threatpost ".
Threat Post
ThreatList: Despite Fraud Awareness, Password Reuse Persists for Half of U.S. Consumers
One-third of respondents in a new poll said that have been a victim of fraud or identity theft in the past.
π΄ Most Businesses to Add More Cloud Security Tools π΄
π Read
via "Dark Reading: ".
Cloud adoption drives organizations to spend in 2019 as they learn traditional security practices can't keep up.π Read
via "Dark Reading: ".
Dark Reading
Most Businesses to Add More Cloud Security Tools
Cloud adoption drives organizations to spend in 2019 as they learn traditional security practices can't keep up.
π΄ 'PortSmash' Brings New Side-Channel Attack to Intel Processors π΄
π Read
via "Dark Reading: ".
New vulnerability exposes encryption keys in the first proof-of-concept code.π Read
via "Dark Reading: ".
Darkreading
'PortSmash' Brings New Side-Channel Attack to Intel Processors
New vulnerability exposes encryption keys in the first proof-of-concept code.
β HSBC Data Breach Hits Online Banking Customers β
π Read
via "The first stop for security news | Threatpost ".
The data breach includes names, addresses, transaction histories, account information and more.π Read
via "The first stop for security news | Threatpost ".
Threat Post
HSBC Data Breach Hits Online Banking Customers
The data breach includes names, addresses, transaction histories, account information and more.
β Android November update fixes flaws galore β
π Read
via "Naked Security".
Android's November security bulletin is here and thereβs more to patch, and more urgency about applying them.π Read
via "Naked Security".
Naked Security
Android November update fixes flaws galore
Androidβs November security bulletin is here and thereβs more to patch, and more urgency about applying them.
π What businesses can learn from political campaigns about using big data π
π Read
via "Security on TechRepublic".
Chris Wilson of WPA Intelligence explains how businesses could use predictive analytics to target customers, much like how political campaigners use targeting of potential voters.π Read
via "Security on TechRepublic".
TechRepublic
What businesses can learn from political campaigns about using big data
Chris Wilson of WPA Intelligence explains how businesses could use predictive analytics to target customers, much like how political campaigners use targeting of potential voters.
β WhatsApp βmartinelliβ warning is a hoax, donβt forward it β
π Read
via "Naked Security".
A WhatsApp chain letter is warning of a malware-packing video called "martinelli", and selling its lie with a grain of truth.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Serious XSS flaw discovered in Evernote for Windows, update now! β
π Read
via "Naked Security".
Online-note-sharing company Evernote has patched a hole that allowed attackers to infect notes shared via its service.π Read
via "Naked Security".
Naked Security
Serious XSS flaw discovered in Evernote for Windows, update now!
Online-note-sharing company Evernote has patched a hole that allowed attackers to infect notes shared via its service.
β Voting machine manual tells officials to reuse weak passwords β
π Read
via "Naked Security".
The manual turns good advice on its head, telling officials to use, reuse and recycle weak passwords.π Read
via "Naked Security".
Naked Security
Voting machine manual tells officials to reuse weak passwords
The manual turns good advice on its head, telling officials to use, reuse and recycle weak passwords.
π Top 20 application vulnerabilities in the enterprise are dominated by Adobe and Microsoft π
π Read
via "Security on TechRepublic".
Among the 20 application vulnerabilities, half were for Adobe Flash and 20% were by Microsoft Office.π Read
via "Security on TechRepublic".
π Why you should use a password manager π
π Read
via "Security on TechRepublic".
Jack Wallen discusses why everyone should use a password manager.π Read
via "Security on TechRepublic".
TechRepublic
Why you should use a password manager
Jack Wallen discusses why everyone should use a password manager.
π΄ 20 Cybersecurity Firms to Watch π΄
π Read
via "Dark Reading: ".
A look at some of the more interesting investments, acquisitions, and strategic moves in the security sector over the past year.π Read
via "Dark Reading: ".
Dark Reading
20 Cybersecurity Firms to Watch
A look at some of the more interesting investments, acquisitions, and strategic moves in the security sector over the past year.
π΄ 5 Reasons Why Threat Intelligence Doesn't Work π΄
π Read
via "Dark Reading: ".
Cybersecurity folks often struggle to get threat intelligence's benefits. Fortunately, there are ways to overcome these problems.π Read
via "Dark Reading: ".
Darkreading
5 Reasons Why Threat Intelligence Doesn't Work
Cybersecurity folks often struggle to get threat intelligence's benefits. Fortunately, there are ways to overcome these problems.
π Consumers are more concerned with cybersecurity and data privacy in 2018 π
π Read
via "Security on TechRepublic".
The majority of users would stop interacting with a brand after a breach.π Read
via "Security on TechRepublic".
TechRepublic
Consumers are more concerned with cybersecurity and data privacy in 2018
The majority of users would stop interacting with a brand after a breach.
β Rapidly Growing Router Botnet Takes Advantage of 5-Year-Old Flaw β
π Read
via "The first stop for security news | Threatpost ".
A sophisticated proxy code has infected hundreds of thousands of devices already.π Read
via "The first stop for security news | Threatpost ".
Threat Post
Rapidly Growing Router Botnet Takes Advantage of 5-Year-Old Flaw
A sophisticated proxy code has infected hundreds of thousands of devices already.
β WordPress Flaw Opens Millions of WooCommerce Shops to Takeover β
π Read
via "The first stop for security news | Threatpost ".
A file delete vulnerability in WordPress can be elevated into a remote code execution vulnerability for plugins like WooCommerce.π Read
via "The first stop for security news | Threatpost ".
Threat Post
WordPress Flaw Opens Millions of WooCommerce Shops to Takeover
A file delete vulnerability in WordPress can be elevated into a remote code execution vulnerability for plugins like WooCommerce.
π΄ Utah Hacker Pleads Guilty to DoS Attacks: DoJ π΄
π Read
via "Dark Reading: ".
Online gaming companies, including Sony Online Entertainment, and servers were main targets.π Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading
🕳 November Event Spotlight: CISO / CPO GDPR Summits, GDPR Workshops, 43rd Annual IP Institute, GBI CIO Event, Data Protection World Forum, EDAA Summit, IAPP Europe Data Protection Congress, Privacy Insight Series Webinar 🕳
<code>Media</code><code>CISO / CPO GDPR Summits
November
Seattle</code><code>The GDPR fundamentally changed the data privacy landscape, but that was clearly just the beginning.?The recently approved California Consumer Privacy Act firmly plants similar rights in the US market, and other global regulations demonstrate that we are in a new era of data privacy.? Itβs time for a paradigm shift in our approach to data ownership and rights.</code><code>This series is part of a special education / networking series in which TrustrArc is partnering with Intel, Microsoft, BDO, and GDPR Edge to bring to 20 locations across the US and EU. The Summits will bring together a wide range of expertise and industry perspectives from practitioners, the participating partners, and other special guests to discuss emerging trends on data privacy management.</code><code>>Reserve your seat to a November CISO / CPO GDPR Summit today</code><code>_____________________________________________________________________________</code><code>GDPR Privacy Management Workshops
November
Boston, Washington DC, Seattle & New York</code><code>The TrustArc Privacy Workshops are designed to help businesses achieve, demonstrate, and manage ongoing compliance for the EU GDPR and other regulations and frameworks, including Privacy Shield and CCPA. The free workshops provide informative guidance, peer discussions, and practical solutions on how to operationalize privacy program management along with examples of how companies are using privacy technology tools to help automate compliance.</code><code>The U.S. Department of Commerce will be joining as presenters for Workshops in Boston, Washington DC and New York.</code><code>Topics to be covered in the workshops include: Data Mapping, Records of Processing, DPIA / PIA Management, International Data Transfer, Individual Rights / Data Subjects Access Rights Management, Consent Management, and Compliance Reporting.
</code><code>>Request a seat here</code><code>_____________________________________________________________________________</code><code>43rd Annual IP Institute: Creativity and Innovation in the Arts and Sciences
November 7 β November 9
San Jose, CA</code><code>This yearβs multi-day IP Institute celebrates the diversity of IP in our lives and culture by offering outstanding educational programming as well as multiple fun networking events. This yearβs Institute provides a wide range of speakers and presentations on patent, copyright, trademark, trade secret, internet and privacy, cybercrime, technology transfer, licensing, music and entertainment, IP specific ethics, and more.</code><code>TrustArc Senior Counsel Darren Abernethy will be speaking on βGDPR: Lessons Learned From the Front Lineβ on Thursday, November 8th at 10:05am.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>GBI CIO Event
November 15
London</code><code>The CIO Event brings together technology leaders from across the public, large enterprises & mid-market sectors and will provide you with a strategic and practical toolkit to help drive transformation including CIOβs discussing the latest industry trends, workshops, panel discussions & Round table sessions led by visionaries within technology, first-hand case studies on the challenges facing IT andantastic networking opportunities with peers throughout the day.</code><code>TrustArc & GDPR Edge are sponsors and will be speaking at this event.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>Data Protection World Forum
November 20 β November 21
London</code><code>In an increasingly digital economy theβ¦
<code>Media</code><code>CISO / CPO GDPR Summits
November
Seattle</code><code>The GDPR fundamentally changed the data privacy landscape, but that was clearly just the beginning.?The recently approved California Consumer Privacy Act firmly plants similar rights in the US market, and other global regulations demonstrate that we are in a new era of data privacy.? Itβs time for a paradigm shift in our approach to data ownership and rights.</code><code>This series is part of a special education / networking series in which TrustrArc is partnering with Intel, Microsoft, BDO, and GDPR Edge to bring to 20 locations across the US and EU. The Summits will bring together a wide range of expertise and industry perspectives from practitioners, the participating partners, and other special guests to discuss emerging trends on data privacy management.</code><code>>Reserve your seat to a November CISO / CPO GDPR Summit today</code><code>_____________________________________________________________________________</code><code>GDPR Privacy Management Workshops
November
Boston, Washington DC, Seattle & New York</code><code>The TrustArc Privacy Workshops are designed to help businesses achieve, demonstrate, and manage ongoing compliance for the EU GDPR and other regulations and frameworks, including Privacy Shield and CCPA. The free workshops provide informative guidance, peer discussions, and practical solutions on how to operationalize privacy program management along with examples of how companies are using privacy technology tools to help automate compliance.</code><code>The U.S. Department of Commerce will be joining as presenters for Workshops in Boston, Washington DC and New York.</code><code>Topics to be covered in the workshops include: Data Mapping, Records of Processing, DPIA / PIA Management, International Data Transfer, Individual Rights / Data Subjects Access Rights Management, Consent Management, and Compliance Reporting.
</code><code>>Request a seat here</code><code>_____________________________________________________________________________</code><code>43rd Annual IP Institute: Creativity and Innovation in the Arts and Sciences
November 7 β November 9
San Jose, CA</code><code>This yearβs multi-day IP Institute celebrates the diversity of IP in our lives and culture by offering outstanding educational programming as well as multiple fun networking events. This yearβs Institute provides a wide range of speakers and presentations on patent, copyright, trademark, trade secret, internet and privacy, cybercrime, technology transfer, licensing, music and entertainment, IP specific ethics, and more.</code><code>TrustArc Senior Counsel Darren Abernethy will be speaking on βGDPR: Lessons Learned From the Front Lineβ on Thursday, November 8th at 10:05am.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>GBI CIO Event
November 15
London</code><code>The CIO Event brings together technology leaders from across the public, large enterprises & mid-market sectors and will provide you with a strategic and practical toolkit to help drive transformation including CIOβs discussing the latest industry trends, workshops, panel discussions & Round table sessions led by visionaries within technology, first-hand case studies on the challenges facing IT andantastic networking opportunities with peers throughout the day.</code><code>TrustArc & GDPR Edge are sponsors and will be speaking at this event.</code><code>>Learn more here</code><code>_____________________________________________________________________________</code><code>Data Protection World Forum
November 20 β November 21
London</code><code>In an increasingly digital economy theβ¦
π΄ Why Password Management and Company Security Strategies Fall Short π΄
π Read
via "Dark Reading: ".
Researchers say companies need to rethink their password training and take a more holistic approach to security.π Read
via "Dark Reading: ".
Dark Reading
Why Password Management and Company Security Strategies Fall Short
Researchers say companies need to rethink their password training and take a more holistic approach to security.