πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ•΄ Code42: Data Loss Protection is the New DLP πŸ•΄

Data loss protection helps companies get more proactive than data loss prevention and will help customers in an era of Big Data, says Vijay Ramanathan of Code 42. Data loss protection helps with both time to awareness and time to response; its reliance on automation also means greater volumes of data can be managed.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Lockpath Advocates Benefits of Continuous Security Management πŸ•΄

Risk management and compliance technologies emerge from the intersection of technology, security, and regulation; continuous security management helps professionals from multiple departments and disciplines access the info they need, when they need it, according to Sam Abadir of Lockpath.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ To Improve Security, We Must Focus on Its People πŸ•΄

New technology can help cybersecurity bridge the talent gap, but tech won't do much without people to operate it.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ From Silicon to Security: Synopsys Bolsters App Security with New Platform πŸ•΄

Application security is always important to infosec professionals, and as Ravi Iyer of Synopsys points out, software development trends like Agile, DevOps and CI/CD push app security to the forefront. Polaris, the new software integrity platform from Synopsys, can help with early detection of software vulnerabilities.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Gemalto Helps Navigate Security in the Cloud Era πŸ•΄

With digital transformation in full swing and Big Data accumulating, end-user organizations have their hands full to manage, store and protect all their data, according to Todd Moore of Gemalto. While end-users have access to cloud-based encryption and other security services, Moore warns that the bad guys have access to them too.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Anomali: Integration of Disparate Security Systems is Essential πŸ•΄

With a record number of cyber-attacks recorded in 2018 and even more expected this year, integrating multiple security sub-systems is essential for enterprises, says Anomali's Hugh Njemanze. He also encourages companies to operationalize their threat intelligence and to get better at sharing threat intel data.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Endgame Encourages Users to Balance Detection and Response Vs. Prevention πŸ•΄

Not all security data that's publicly shared gets analyzed or vetted, but Forrester's recent independent analysis of MITRE ATT&CK evaluation offers up useful insights to infosec pros and can guide their procurement and security strategy, according to Mike Nichols of Endgame. These reports can help with intelligent evaluation of detection and response versus prevention approaches.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Deep Instinct Touts Predictive Aspects of Deep Learning πŸ•΄

Deep learning, as a subset of machine learning (which is itself a subset of artificial intelligence), can help transform a company's security posture, says Deep Instinct's Guy Caspi. Deep learning's predictive capabilities also change the security management equation reactive to proactive, an important breakthrough in forecasting and risk management.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Contrast Security Boosts App Security with Self-Protecting Software πŸ•΄

Vulnerability rates in application software remain as high as they were 15 years ago, according to Jeff Williams, CTO of Contrast Security. But by injecting intelligent agents into code, app software gets instruments with thousands of smart, agile sensors that detect and correct vulnerabilities before deployment, and protect apps in operation.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Code42: Data Loss Protection is the New DLP πŸ•΄

Data loss protection helps companies get more proactive than data loss prevention and will help customers in an era of Big Data, says Vijay Ramanathan of Code 42. Data loss protection helps with both time to awareness and time to response; its reliance on automation also means greater volumes of data can be managed.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ AT&T Cybersecurity Ensures Companies SOAR with Security Strategy πŸ•΄

SOAR, or Security Orchestration, Automation and Response, helps customers ensure the sanctity of their infrastructure, data and end-users, according to Sanjay Ramnath, vice president, product marketing, of AT&T Cybersecurity. Integrating analytics, automation and threat intelligence helps customers eliminate the seams where the bad guys get in.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to choose the right cybersecurity framework πŸ”

Does your organization need NIST, CSC, ISO, or FAIR frameworks? Here's how to start making sense of security frameworks.

πŸ“– Read

via "Security on TechRepublic".
❌ RSA Conference 2019: NIST’s Privacy Framework Starts to Take Shape ❌

The Privacy Framework is being developed to be risk-based/outcome-based and non-prescriptive, unlike the GDPR.

πŸ“– Read

via "Threatpost".
πŸ•΄ Raytheon IIS Seizes the Moment with Cybersecurity as a Service πŸ•΄

Tapping the flexibility and reach of the cloud makes good sense for customers, according to Jon Check, senior director, cyber protection solutions for Raytheon Intelligence, Information and Services. Cybersecurity as a Service (CYaaS) ensures both data resilience and cyber resilience by integrating analytics and automation features into the mix.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ NTT Security Confirms WhiteHat Acquisition πŸ•΄

WhiteHat Security will continue to operate as an independent subsidiary of NTT Security following the deal.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Facebook Plans Makeover as Privacy-Focused Network πŸ•΄

CEO Mark Zuckerberg published a lengthy post detailing the company's shift from open platform to privacy-focused communications.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Regular User Awareness Training Still the Best Security Tactic πŸ•΄

Email continues to be the largest area of exposure for most organizations, and phishing emails lead the charge, according to Stu Sjouwerman, founder and CEO of KnowBe4. And while AI and machine learning can make a difference, these same tools are used by the bad guys, Sjouwerman adds. Regular, monthly trainings help reduce phishing click rates.

πŸ“– Read

via "Dark Reading: ".
πŸ” How to generate SSH keys on macOS Mojave πŸ”

macOS is perfectly capable of working with SSH keys, for more secure remote connections. Jack Wallen shows you how to generate the necessary keys and copy them to a server.

πŸ“– Read

via "Security on TechRepublic".
πŸ” Termite and EarthWorm testing tool weaponized to create multi-platform botnet πŸ”

Hacker groups in Asia have weaponized the networking and pentesting tools in a series of attacks first identified in March 2018, as well as the high-profile SingHealth attack.

πŸ“– Read

via "Security on TechRepublic".
ATENTIONβ€Ό New - CVE-2018-20799 (pfsense)

In pfSense 2.4.4_1, blocking of source IP addresses on the basis of failed HTTPS authentication is inconsistent with blocking of source IP addresses on the basis of failed SSH authentication (the behavior does not match the sshguard documentation), which might make it easier for attackers to bypass intended access restrictions.

πŸ“– Read

via "National Vulnerability Database".
πŸ•΄ 4 Ways At-Work Apps Are Vulnerable to Attack πŸ•΄

Collaboration applications make users and IT teams more efficient. But they come with an added cost: security.

πŸ“– Read

via "Dark Reading: ".