News

  • Protect Your Social Media Accounts from Hacks and Attacks

    PRIVACY PRIVACY Here’s to the hashtags, the likes, the followers, the DMs, and the LOLs—June 30th marks Social Media Day, a time to celebrate and reflect on how social media has changed our lives over the years.  Started in 2010 by media and entertainment company Mashable, celebrations have taken on all kinds of forms. Meetups, contests, calls to increase your…

    Read More

  • Two Ways that Security in the Azure Cloud Just Got Simpler

    PRIVACY PRIVACY In ongoing partnership with Microsoft Azure, CIS has released two CIS Benchmarks, one updated and one new, for Microsoft Azure. Read More

    Read More

  • Three Ways that Security in the Azure Cloud Just Got Simpler

    PRIVACY PRIVACY In ongoing partnership with Microsoft Azure, CIS has released two CIS Benchmarks, one updated and one new, for Microsoft Azure. Read More

    Read More

  • 5 ways to grow the cybersecurity workforce

    PRIVACY PRIVACY The demand for cybersecurity professionals has surged over the past decade.  According to (ISC)2’s 2020 Cybersecurity Workforce Study, while the global cybersecurity workforce need stands at 3.1 million, with nearly 400,000 open cybersecurity positions in the U.S. In addition, more than half of survey respondents (56%) say that cybersecurity staff shortages are putting…

    Read More

  • Large-Scale Collection of Cell Phone Data at US Borders

    PRIVACY PRIVACY The Washington Post is reporting that the US Customs and Border Protection agency is seizing and copying cell phone, tablet, and computer data from “as many as” 10,000 phones per year, including an unspecified number of American citizens. This is done without a warrant, because “…courts have long granted an exception to border…

    Read More

  • What is Data-as-a-Service (DaaS)? Understanding the benefits, and common use cases

    PRIVACY PRIVACY This blog was written by an independent guest blogger. If you were looking at all the opportunities data unlocks for your businesses, you’ve probably stumbled upon DaaS. DaaS stands for data as a service, which may appear as something overly complicated and expensive to consider. It’s quite the opposite, and it has the…

    Read More

  • Collaboration is key to balance customer experience with security, privacy

    PRIVACY PRIVACY The way Yaron Cohen sees it, companies today must do in the digital world what came naturally to neighborhood merchants who saw their customers every day. “In the old world, when people used to go to the corner store and meet the same shopkeeper every day, he’d know their tastes and what they’d…

    Read More

  • International cooperation is key to fighting threat actors and cybercrime

    PRIVACY PRIVACY In this era of cybersecurity, when nation-state digital attacks and cybercrime quickly cut across country borders and create global crises, international cooperation has become an urgent priority. The need for global collaboration to cope with various pressing threats, from electronic espionage to ransomware attacks on critical infrastructure, is imperative to prevent economic and…

    Read More

  • New Spear Phish Methodology Relies on PuTTY SSH Client to Infect Systems

    PRIVACY PRIVACY It tried to trick victims into clicking on malicious files as part of a fake Amazon job assessment Read More

    Read More

  • CISA Expands Vulnerabilities Catalog With Old, Exploited Flaws

    PRIVACY PRIVACY Four of the CVEs posted are from 2013, and one is from 2010 Read More

    Read More

News, Advisories and much more

Exit mobile version