article thumbnail

ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures

The Last Watchdog

Last Friday, July 2, in a matter of a few minutes, a Russian hacking collective, known as REvil, distributed leading-edge ransomware to thousands of small- and mid-sized businesses (SMBs) across the planet — and succeeded in locking out critical systems in at least 1,500 of them. Dom Glavach, CSO and chief strategist, CyberSN.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Shah provides her expertise in hacking, software development, and kernel development and advocates for open source initiatives. Lots of accounts including Bezos, Elon Musk, Joe Biden, Barack Obama, Bill Gates, Mr Beast, and a ton more getting hacked for a bitcoin scheme. Also read: Top Next-Generation Firewall (NGFW) Vendors for 2021.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Data Theorem helps inventory sprawling APIs — as the first step to securing them

The Last Watchdog

If I go to a CSO and say, ‘We can secure your APIs,’ he’ll say, ‘Great, can you also find them for me?’ ” observed Dwivedi, Data Theorem’s founder. The problem wasn’t a hack, but a broken API. Because companies can’t protect APIs with traditional means, like firewalls, they must find other ways to secure them. Postal Service.

article thumbnail

A CISO's Guide to a Good Night's Sleep

SecureWorld News

Is the firewall configured appropriately to block a threat? The best sleep a CISO can have is when they have the best visibility into everything they manage to ensure nothing slips through the cracks and becomes a hack. Did teams install the software correctly? You get the point. Plan and test, test and plan.

CISO 74
article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

“Certifications range from penetration testers , government/industry regulatory compliance , ethical hacking , to industry knowledge,” he said. My advice for anybody that asks me which certifications they should get is this: find a certification in a subject that you wish to learn about,” Palo Alto Networks CSO Rick Howard said.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Always keep your eyes open to control-rights of the senior IT managers or systems administrators with the authority to configure servers, firewalls, cloud storage, and file-sharing (or another network privilege). What are the benefits of cyber security awareness trainings?