-
Defense in depth explained: Layering tools and processes for better security
PRIVACY PRIVACY What is defense in depth? Defense in depth is a security strategy in which multiple security tools, mechanisms, and policies are deployed in tandem on the assumption that if one fails, another will hold. Rather than, say, relying solely on a firewall to keep hackers out of a corporate network, an organization would…
-
European Police Arrest 100 Suspects in BEC Crackdown
PRIVACY PRIVACY Invoice fraud ring targeted state-owned organizations Read More
-
India’s cybersecurity skills shortage: Airtel Payments Bank’s CISO proposes a path forward
PRIVACY PRIVACY Manish Pandey, CISO of Airtel Payments Bank, has worked in several industries, including e-commerce, academics and fast-moving consumer goods ITeS, and banking. So he has seen first-hand the challenges of the cybersecurity skills gap in multiple contexts. Pandey started his professional journey in cybersecurity with the Indian Computer Emergency Response Team, the government’s…
-
Smashing Security podcast #285: Uber’s hidden hack, tips for travel, and AI accent fixes
PRIVACY PRIVACY Uber may not face prosecution over its handling of a 2016 data breach – but its former chief security head does; how to defend your digital devices’ data while on vacation, and how to change your accent with artificial intelligence. All this and much much more is discussed in the latest edition of…
-
Uber’s former head of security faces fraud charges after allegedly covering up data breach
PRIVACY PRIVACY The former Chief Security Officer of Uber is facing wire fraud charges over allegations that he covered up a data breach that saw hackers steal the records of 57 million passengers and drivers. Read more in my article on the Hot for Security blog. Read More
-
Why Whole-of-State Cybersecurity Is the Way Forward
PRIVACY PRIVACY The ransomware threat confronting SLTT government organizations have led some to advocate for a whole-of-state cybersecurity approach. Read More
-
Cyber-Criminal Offers 5.4m Twitter Users’ Data
PRIVACY PRIVACY The seller advertised the data on the Breached Forums site and demanded at least $30,000 for it Read More
-
Senators Introduce Quantum Encryption Preparedness Law
PRIVACY PRIVACY Lawmakers introduced the bill because they’re worried about the potential for quantum computers to easily crack current cryptographic algorithms Read More
-
Criminals Use Malware as Messaging Bots to Steal Data
PRIVACY PRIVACY Cyber-criminals are using the Telegram and Discord messaging apps as command and control mechanisms Read More
-
Teleport features passwordless access with new access plane update
PRIVACY PRIVACY Teleport, an open source platform designed to provide zero trust access management applications, has announced the latest version of its unified access plane, Teleport 10, which features passwordless access as a single sign-on (SSO) infrastructure access solution. Teleport’s unified access plane is an open source identity-based infrastructure access platform that unifies secure access…