Then and Now: Securing Privileged Access Within Healthcare Orgs
Joseph Carson, chief security scientist and advisory CISO at ThycoticCentrify, discusses best practices for securing healthcare data against the modern threat landscape. [...]
Joseph Carson, chief security scientist and advisory CISO at ThycoticCentrify, discusses best practices for securing healthcare data against the modern threat landscape. [...]
In this Threatpost podcast, Forcepoint’s SASE and Zero Trust director describes how the pandemic jump-started SASE adoption. [...]
Justin Jett, director of audit and compliance for Plixer, discusses the elements of a successful advanced security posture. [...]
Tech giant disables ProjectWEB cloud-based collaboration platform after threat actors gained access and nabbed files belonging to several state entities. [...]
David Wolpoff, CTO at Randori, argues that the call for rapid cloud transition Is a dangerous proposition: "Mistakes will be made, creating opportunities for our adversaries. [...]
Threat hunters weigh in on how the business of ransomware, the complex relationships between cybercriminals, and how they work together and hawk their wares on the Dark Web. [...]
Sivan Tehila, cybersecurity strategist at Perimeter 81, discusses the elements involved in creating a modern SIEM strategy for remote work and cloud-everything. [...]
Several mobile apps, some with 10 million downloads, have opened up personal data of users to the public internet – and most aren't fixed. [...]
I am pleased to share the latest episode of AWS Verified, where we bring you conversations with global cybersecurity leaders about important issues, such as how to create a culture of security, cyber resiliency, Zero Trust, and other emerging security trends. Recently, I got the opportunity to experience distance …
Enterprises are embracing on-demand freelance help – but the practice, while growing, opens up entirely new avenues of cyber-risk. [...]
Attackers sent 52M malicious messages leveraging the likes of Office 365, Azure, OneDrive, SharePoint, G-Suite and Firebase storage in Q1 2021. [...]
Anurag Kahol, CTO at Bitglass, discusses options for detecting malicious or dangerous activity from within an organization. [...]
Keynoters from Cisco, Netflix and RSA highlighted lessons from the last year, and cybersecurity's new mandate in the post-pandemic world: Bounce back stronger. [...]
Pandemic and evolving IT demands are having a major, negative impact on CISOs' mental health, a survey found. [...]
Tony Lauro, director of security technology and strategy at Akamai, discusses hardware security dongles and using phones to act as surrogates for them. [...]
The ‘Send My’ exploit can use Apple's locator service to collect and send information from nearby devices for later upload to iCloud servers. [...]
Paper ballots and source-code transparency are recommended to improve election security. [...]
Argyle is paying workers to help hack payroll providers, researchers suspect. [...]
Wi-Fi devices going back to 1997 are vulnerable to attackers who can steal your data if they're in range. [...]
Microsoft's May 2021 Patch Tuesday updates include fixes for four critical security vulnerabilities. [...]
Aamir Lakhani, researcher at FortiGuard Labs, discusses leading-edge threats related to edge access/browsers/IoT, and the COVID-19 vaccine, as a way of getting into larger organizations. [...]
Analyst finds ransomware evidence, despite a contractor's denial of compromise. [...]
The networking giant has rolled out patches for remote code-execution and command-injection security holes that could give attackers keys to the kingdom. [...]
I’m excited to share that the Defense Information Systems Agency (DISA) has authorized three additional Amazon Web Services (AWS) services at Impact Level (IL) 4 and IL 5 in the AWS GovCloud (US) Regions, as well as five additional AWS services and one feature at IL 6 in …
Researchers warned that unpatched versions of HPE’s Edgeline Infrastructure Manager are open to remote authentication-bypass attacks. [...]