π How companies can diversify their cybersecurity teams π
π Read
via "Security on TechRepublic".
At RSA 2019, Elena Elkina of Women in Security and Privacy discussed how businesses can seek out female and minority candidates for cybersecurity jobs.π Read
via "Security on TechRepublic".
TechRepublic
How companies can diversify their cybersecurity teams
At RSA 2019, Elena Elkina of Women in Security and Privacy discussed how businesses can seek out female and minority candidates for cybersecurity jobs.
π Will we see a federal privacy law in the US? π
π Read
via "Security on TechRepublic".
At RSA 2019, Dana Simberkoff of AvePoint discussed how companies can reevaluate privacy policies.π Read
via "Security on TechRepublic".
TechRepublic
Will we see a federal privacy law in the US?
At RSA 2019, Dana Simberkoff of AvePoint discussed how companies can reevaluate privacy policies.
π΄ DHS: No Investigation Planned for Electrical Grid Incursions π΄
π Read
via "Dark Reading: ".
The subtext to a panel discussion during RSA is that risks to national infrastructure are fraught with political considerations.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
β Citrix Falls Prey to Password-Spraying Attack β
π Read
via "Threatpost".
International cybercriminals likely exploited weak passwords on an internal network, the FBI said.π Read
via "Threatpost".
Threat Post
Citrix Falls Prey to Password-Spraying Attack
International cybercriminals likely exploited weak passwords on an internal network, the FBI said.
β Five female technoheroes you might never have heard ofβ¦ β
π Read
via "Naked Security".
Can you guess whom we chose for our #IWD2019 technoheroes? There are hints in the image...π Read
via "Naked Security".
Naked Security
Five female technoheroes you might never have heard ofβ¦
Can you guess whom we chose for our #IWD2019 technoheroes? There are hints in the imageβ¦
π How companies can diversify their cybersecurity teams π
π Read
via "Security on TechRepublic".
At RSA 2019, Elena Elkina of Women in Security and Privacy discussed how businesses can seek out female and minority candidates for cybersecurity jobs.π Read
via "Security on TechRepublic".
TechRepublic
How companies can diversify their cybersecurity teams
At RSA 2019, Elena Elkina of Women in Security and Privacy discussed how businesses can seek out female and minority candidates for cybersecurity jobs.
β RSA Conference 2019: Operational Technology Widens Supply Chain Attack Surfaces β
π Read
via "Threatpost".
Between operational technology and open source, the supply chain is rapidly expanding - and companies that can't keep up will be the next security targets, said experts at RSA Conference 2019.π Read
via "Threatpost".
Threat Post
RSA Conference 2019: Operational Technology Widens Supply Chain Attack Surfaces
Between operational technology and open source, the supply chain is rapidly expanding - and companies that can't keep up will be the next security targets, said experts at RSA Conference 2019.
π΄ Citrix Hacked by 'International Cybercriminals' π΄
π Read
via "Dark Reading: ".
FBI informed Citrix this week of a data breach that appears to have begun with a 'password spraying' attack to steal weak credentials to access the company's network.π Read
via "Dark Reading: ".
Darkreading
Citrix Hacked by 'International Cybercriminals'
FBI informed Citrix this week of a data breach that appears to have begun with a 'password spraying' attack to steal weak credentials to access the company's network.
π΄ Shifting Attacks Put Increasing ID Fraud Burden on Consumers π΄
π Read
via "Dark Reading: ".
Card-present fraud is down, but attackers continue to find new strategies, and consumers are paying the price.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
π΄ Tina Fey, RSAC, and Parallels Between Improv and Cyber π΄
π Read
via "Dark Reading: ".
This year's RSA Conference concluded with actress Tina Fey and program chair Hugh Thompson chatting about teambuilding, diversity, and improv.π Read
via "Dark Reading: ".
Dark Reading
Tina Fey, RSAC, and Parallels Between Improv and Cyber
This year's RSA Conference concluded with actress Tina Fey and program chair Hugh Thompson chatting about teambuilding, diversity, and improv.
ATENTIONβΌ New - CVE-2017-3164
π Read
via "National Vulnerability Database".
Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.π Read
via "National Vulnerability Database".
π Will we see a federal privacy law in the US? π
π Read
via "Security on TechRepublic".
At RSA 2019, Dana Simberkoff of AvePoint discussed how companies can reevaluate privacy policies.π Read
via "Security on TechRepublic".
TechRepublic
Will we see a federal privacy law in the US?
At RSA 2019, Dana Simberkoff of AvePoint discussed how companies can reevaluate privacy policies.
β RSA Conference 2019: The Expanding Automation Platform Attack Surface β
π Read
via "Threatpost".
Hacking into smart homes is becoming increasingly easy and a great way to steal victims' personal information, Trend Micro said at RSA 2019.π Read
via "Threatpost".
Threat Post
RSA Conference 2019: The Expanding Automation Platform Attack Surface
Hacking into smart homes is becoming increasingly easy and a great way to steal victims' personal information, Trend Micro said at RSA 2019.
π Do bug bounties help open source security? π
π Read
via "Security on TechRepublic".
The biggest problem of targeting open source software to find security issues relates to IT.π Read
via "Security on TechRepublic".
TechRepublic
Do bug bounties help open source security?
The biggest problem of targeting open source software to find security issues relates to IT.
π How to protect your small business from the dark web π
π Read
via "Security on TechRepublic".
Education, monitoring and response tools, and training about the dark web are essential to protecting your small business from cybercriminals.π Read
via "Security on TechRepublic".
TechRepublic
How to protect your small business from the dark web
Education, monitoring and response tools, and training about the dark web are essential to protecting your small business from cybercriminals.
π Unintended inferences: The biggest threat to data privacy and cybersecurity π
π Read
via "Security on TechRepublic".
Find out why data privacy breaches and scandals (think Facebook, Marriott, and Yahoo), artificial intelligence, and analytics have implications for how your business manages cybersecurity.π Read
via "Security on TechRepublic".
TechRepublic
Unintended inferences: The biggest threat to data privacy and cybersecurity
Find out why data privacy breaches and scandals (think Facebook, Marriott, and Yahoo), artificial intelligence, and analytics have implications for how your business manages cybersecurity.
π Everything you need to know about Windows updates π
π Read
via "Security on TechRepublic".
Beyond Patch Tuesday: understanding the different monthly security and quality updates for Windows, and how they're getting more efficient.π Read
via "Security on TechRepublic".
TechRepublic
Everything you need to know about Windows updates
Beyond Patch Tuesday: understanding the different monthly security and quality updates for Windows, and how they're getting more efficient.
β Monday review β the hot 25 stories of the week β
π Read
via "Naked Security".
From a serious Chrome zero-day to Comcast's security nightmare, and everything in between - it's weekly roundup time.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β FTC says taxpayer voice phishing scams are up nearly 20x β
π Read
via "Naked Security".
The real Social Security people will never call to threaten your benefits or tell you to wire money, send cash, or put money on gift cards.π Read
via "Naked Security".
Naked Security
FTC says taxpayer voice phishing scams are up nearly 20x
The real Social Security people will never call to threaten your benefits or tell you to wire money, send cash, or put money on gift cards.
β Booking a restaurant? Let Googleβs Duplex AI make the call for you β
π Read
via "Naked Security".
Bon appΓ©tit, Dave. Google's table-booking Duplex AI needs to pass the creepy test.π Read
via "Naked Security".
Naked Security
Booking a restaurant? Let Googleβs Duplex AI make the call for you
Bon appΓ©tit, Dave. Googleβs table-booking Duplex AI needs to pass the creepy test.
β US Army clarifies its killer robot plans β
π Read
via "Naked Security".
The US Army has been forced to clarify its intentions for killer robots after unveiling a new program to build AI-powered targeting systems last month.π Read
via "Naked Security".
Naked Security
US Army clarifies its killer robot plans
The US Army has been forced to clarify its intentions for killer robots after unveiling a new program to build AI-powered targeting systems last month.