Remove find-a-partner
article thumbnail

Finding a Great Partner in CrowdStrike

Security Boulevard

From my first talk with George Kurtz at CrowdStrike, I felt like I’d met a kindred spirit, and I’m so excited to share that CrowdStrike has become a Salt Security investor, and Salt is joining the CrowdStrike partner ecosystem. We re-opened our $140 million Series D round to include CrowdStrike. Great minds think alike.

article thumbnail

Critical Insight Reports Fewer Cybersecurity Breaches in Health Care, Yet Victim Numbers Are Up in 2023

Tech Republic Security

A new study by Critical Insight shows that cybersecurity attacks in the health care sector are hitting more individuals and finding vulnerabilities in third-party partners.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leaked Signing Keys Are Being Used to Sign Malware

Schneier on Security

Łukasz Siewierski, a member of Google’s Android Security Team, has a post on the Android Partner Vulnerability Initiative (AVPI) issue tracker detailing leaked platform certificate keys that are actively being used to sign malware. This is a huge problem.

Malware 299
article thumbnail

NSA on Supply Chain Security

Schneier on Security

Software suppliers will find guidance from NSA and our partners on preparing organizations by defining software security checks, protecting software, producing well-secured software, and responding to vulnerabilities on a continuous basis.

Software 269
article thumbnail

Groundbreaking Report Exposes Stark Exclusion of Women in Cybersecurity

SecureWorld News

A first-of-its-kind study by Women in CyberSecurity (WiCyS) has revealed sobering findings about the lack of inclusion and barriers faced by women in the cybersecurity industry. The report's key findings are eye-opening. The qualitative experiences shared by survey participants vividly illustrate the challenges.

article thumbnail

How to Find & Choose IT Outsourcing Services

eSecurity Planet

Even a robust IT or security department will find certain tasks or projects beyond their capabilities. However, buyers in most organizations don’t have the expertise to find and evaluate potential vendors. Organizations can also consider using freelance sites such as Upwork or Fiverr to locate potential outsourcing partners.

article thumbnail

GUEST ESSAY: Why internal IT teams are ill-equipped to adequately address cyber risks

The Last Watchdog

Not only will IT teams need to evaluate all of the tools available in the marketplace to find the best ones for their firm, but they will also need to take time away from their existing responsibilities to garner subject matter expertise around these tools. Every industry is dealing with a myriad of cyber threats in 2024.