article thumbnail

Embracing Automation in Cyber Threat Intelligence: The Key to Timely Protection

SecureWorld News

Threat Intelligence (TI) representation across different levels There is a lot of information on cyberattacks on the internet, and, as a rule, the most helpful information is contained in cyber threat reports ( Threat Intelligence Reports ). Highlighting the AI advantages in ITSM and InfoSec, you can use ChatGPT.

article thumbnail

COVID-19 Has United Cybersecurity Experts, But Will That Unity Survive the Pandemic?

Krebs on Security

At least three major industry groups are working to counter the latest cyber threats and scams. Among the largest in terms of contributors is the COVID-19 Cyber Threat Coalition (CTC), which comprises rough 3,000 security professionals who are collecting, vetting and sharing new intelligence about new cyber threats.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Leak Shows Business Side of China’s APT Menace

Krebs on Security

“The infosec industry is always trying to distinguish [the work] of one APT group from another. The ultimate objective is, not ‘control’ of cyberspace, but control of information, a vision that dominates China’s cyber operations.” But that’s getting harder to do.”

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 59
article thumbnail

The 7 Biggest Cybersecurity Scoops from February 2015

SiteLock

Internet Explorer Vulnerability Discovered. Earlier this month, a security researcher discovered a major security flaw in Microsoft’s Internet Explorer browser. The Internet of Things and Cyber Security. The Infosec Institute recently wrote a topic on the subject, which can be read here. You can read it here.

article thumbnail

MY TAKE: 3 privacy and security habits each individual has a responsibility to embrace

The Last Watchdog

Consider that most of us spend more time navigating the Internet on our laptops and smartphones than we do behind the wheel of a car. But the larger point is that Xbash is just one of dozens of malware families circulating far and wide across the Internet. Credential stuffing campaigns have become part of the fabric of the Internet.

Passwords 196
article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

DeSouza has also earned numerous industry accolades, including Top Global CISO by Cyber Defense Magazine, Top 10 InfoSec Professional by OnCon, and induction into the CISO Hall of Fame by the global Cyber Startup Observatory. Effectively addressing this challenge necessitates a robust email security boundary platform.