Tue.Aug 17, 2021

article thumbnail

The 15 highest-paying certifications for 2021

Tech Republic Security

The top certification on the annual Skillsoft list has a salary of more than $171,000. Find out what certifications you should be working toward.

207
207
article thumbnail

Cybersecurity Requires Decisive Action

Security Boulevard

Corporate executives have a responsibility to ensure long-term positive outcomes for the companies they lead. One way to accomplish this is by minimizing corporate risk and protecting assets through proactive and innovative approaches to cybersecurity. Time and again, however, we have witnessed companies become unnecessary cyberattack victims. Often, these incidents are sadly due to their.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data privacy is a growing concern for more consumers

Tech Republic Security

People surveyed by KPMG reported feeling increasingly uneasy about the data collection practices of corporations.

article thumbnail

Pharmacist faces 120 years in prison for selling vaccination cards on eBay

Bleeping Computer

An Illionois pharmacist arrested today faces 120 years in prison for allegedly selling dozens of authentic COVID-19 vaccination record cards issued by the Center for Disease Control and Prevention (CDC). [.].

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Data privacy laws are constantly changing: Make sure your business is up to date

Tech Republic Security

Lawyer who specializes in data privacy discusses the importance of knowing the law no matter what size business you operate.

article thumbnail

Data sovereignty laws place new burdens on CISOs

CSO Magazine

Your information is at the crux of the issue of data sovereignty. Where is your information? Who has access to the information? Do you have control of your information in each country, or does the government also have access (and control) of your data? Oracle describes how “the exponential growth of data crossing borders and public cloud regions [has seen], more than 100 countries now have passed regulations.

CISO 143

More Trending

article thumbnail

Adopting Zero-Trust for API Security

Security Boulevard

Zero-trust architecture is being adopted across all assets within network infrastructure—data, cloud, applications. And now, more frequently, developers are seeing zero-trust as a useful security approach for APIs. That’s because APIs are becoming a more frequent attack target, in part because they tend to be less mature in their identity and access protections while transmitting.

article thumbnail

Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service

Trend Micro

We recently discovered eight deceptive mobile apps that masquerade as cryptocurrency cloud mining applications where users can earn cryptocurrency by investing money into a cloud-mining operation.

article thumbnail

Dumpster diving is a filthy business

We Live Security

One man’s trash is another man’s treasure – here’s why you should think twice about what you toss in the recycling bin. The post Dumpster diving is a filthy business appeared first on WeLiveSecurity.

article thumbnail

Analysts “strongly believe” the Russian state colludes with ransomware gangs

Malwarebytes

“We have the smoke, the smell of gunpowder and a bullet casing. But we do not have the gun to link the activity to the Kremlin.” This is what Jon DiMaggio, Chief Security Stretegist for Analyst1, said in an interview with CBS News following the release of its latest whitepaper, entitled “ Nation State Ransomware “ The whitepaper is Analyst1’s attempt to identify the depth of human relationships between the Russian government and the ransomware threat groups based in

article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Fortinet delays patching zero-day allowing remote server takeover

Bleeping Computer

Fortinet has delayed patching a zero-day command injection vulnerability found in the FortiWeb web application firewall (WAF) until the end of August. [.].

Firewall 142
article thumbnail

The 5 most annoying things in technology

Tech Republic Security

These five things are driving us crazy, says Tom Merritt. There's hope for some to get better.

article thumbnail

Why you need a SaaS governance plan, and what should be in it

CSO Magazine

SaaS adoption is far outpacing IaaS consumption. Despite that, organizations are focusing almost exclusively on infrastructure security. They must also consider a SaaS governance plan that implements security measures to reduce risk associated with their SaaS usage. That plan includes a combination of compliance frameworks, documentation/due diligence and technical measures for ongoing monitoring and risk reduction. [ Follow these 5 tips for better cloud security. | Get the latest from CSO by si

article thumbnail

UK Defense to seek help from startups to reduce Cyber Attack Surface

CyberSecurity Insiders

United Kingdom’s Ministry of Defense (MoD) is busy calling startups that could help in shrinking its cyber attack surface by developing new hardware and software tools as per the current cyber landscape. On Monday this week, the MoD’s Defense and Security Accelerator (DASA) announced that it would award a 9-month contract worth £300,000 to interested businesses that would help in bolstering its cyber defense.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Amazon Sidewalk highlights network security visibility risks consumer services pose

CSO Magazine

New research from security firm Cato Networks has highlighted potential security risks surrounding the use of Amazon sidewalk and other consumer-grade services that connect to corporate networks due to a lack of visibility. The research also discovered a novel use of Houdini malware to spoof devices and exfiltrate data within the user agent field, a method often undetected by legacy security systems.

article thumbnail

Malware campaign uses clever 'captcha' to bypass browser warning

Bleeping Computer

A malware campaign uses a clever captcha prompt to trick users into bypassing browsers warnings to download the Ursnif (aka Gozi) banking trojan. [.].

Malware 136
article thumbnail

Top 5 tech annoyances

Tech Republic Security

Tom Merritt tells us his top five annoyances in tech and why they are frustrating.

165
165
article thumbnail

Bug in Millions of Flawed IoT Devices Lets Attackers Eavesdrop

Threatpost

A remote attacker could exploit a critical vulnerability to eavesdrop on live audio & video or take control. The bug is in ThroughTek’s Kalay network, used in 83m devices.

IoT 123
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Brazilian government discloses National Treasury ransomware attack

Bleeping Computer

The Brazilian Ministry of Economy has disclosed a ransomware attack that hit some of its computing systems on Friday night, right before the start of the weekend. [.].

article thumbnail

Lawyer discusses the evolving data privacy laws for businesses

Tech Republic Security

Every size company should know the laws regarding data privacy to avoid legal issues. Here's why it's important.

article thumbnail

New Adware targeting Apple MacOS run devices by evading detection

CyberSecurity Insiders

A newly found adware in the wild is seen only targeting Apple MacOS devices. And security analysts from SentinelOne argue the adware dubbed as “AdLoad” has the capabilities of stealing and snooping the infected devices. AdLoad can evade the usual Apple Devices Malware Scanners and is seen amassing and transmitting information from victim devices to remote servers.

Adware 120
article thumbnail

The Phight Against Phishing

Digital Shadows

What is Phish(ing)? No, not the band, unless you’re really into jam bands. We’re talking about the email attack variety. The post The Phight Against Phishing first appeared on Digital Shadows.

Phishing 120
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Pearson agreed to pay $1 million for 2018 Data Theft

CyberSecurity Insiders

Pearson, a London based e-textbook publishing firm that supplies software to Schools and Universities has been slapped with a fine of $1 million for misleading investors about a 2018 data breach that witnessed siphoning of millions of student records by hackers. In what is known to our Cybersecurity Insiders, the penalty was pronounced by the US Securities and Exchange Commission, as Pearson made false and misleading statements on the 2018 data breach that witnessed millions of student usernames

article thumbnail

Needed: A Secure Shopping Experience Across All Channels

IT Security Central

The pandemic hastened long-developing trends toward digitization and decentralization. As virus concerns, social distancing guidelines and convenience pushed people online, ecommerce sales surged, expected to hit $4.2 billion globally this year, jumping ahead by years in the process. To be sure, this isn’t a one-time trend. According to one survey, nearly half of shoppers who altered their shopping […].

eCommerce 118
article thumbnail

Email Security Recommendations You Should Consider from 2021

Cisco Security

With contributions from Jamal “Jay” Bethea, Cisco Secure Email Product Marketing Manager. Think email security is not complicated; think again. Not only is email the #1 attack vector, but regulatory compliance requirements across sectors make it difficult to know which data protection laws are for your industry. Now mix in architectural changes that support cloud productivity suites like Microsoft 365 and Google’s G-Suite to accelerate your business to cloud-based email security serv

Phishing 118
article thumbnail

The Overlooked Security Risks of The Cloud

Threatpost

Nate Warfield, CTO of Prevaliion, discusses the top security concerns for those embracing virtual machines, public cloud storage and cloud strategies for remote working.

Risk 119
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Video surveillance network hacked by researchers to hijack footage

Naked Security

Home automation. Internet of Things. Cloud management. And a security bug that could let other people watch you online.

article thumbnail

Nearly 2 million records from terrorist watchlist exposed online

We Live Security

The secret list was exposed online for three weeks, allowing anyone to access it without any kind of authentication. The post Nearly 2 million records from terrorist watchlist exposed online appeared first on WeLiveSecurity.

article thumbnail

Automate your Cisco Secure Firewall deployment

Cisco Security

I nfrastructure as a Code (IaC) and Automation are now common requests from our customers deploying Cisco Secure Firewalls. This is accelerated with a rapid development of software applications in multi-cloud environments. Our response to this trend is making Cisco Secure Firewall deployable as a code utilizing new IaC templates , which we are happy to announce!

Firewall 113
article thumbnail

The Top 10 Highest Paying Jobs in Information Security – Part 1

The State of Security

Want a job in cybersecurity? There are plenty to go around. Cybersecurity Ventures estimated that there will be 3.5 million job openings in the industry by the end of the year. That makes sense. According to Gartner, global spending on information security and risk management technology is expected to exceed $150 billion in 2021. Organizations […]… Read More.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.