-
Terrascan Joins the Nessus Community, Enabling Nessus To Validate Modern Cloud Infrastructures
PRIVACY PRIVACY The addition of Terrascan to the Nessus family of products helps users better secure cloud native infrastructure by identifying misconfigurations, security weaknesses, and policy violations by scanning Infrastructure as Code repositories. Twenty-three years ago when Nessus was created by Renaud Deraison, the computers the scan engine was designed for were physically attached to…
-
Attacks on Managed Service Providers Expected to Increase
PRIVACY PRIVACY CISA, NSA, FBI, and similar organizations in the other Five Eyes countries are warning that attacks on MSPs — as a vector to their customers — are likely to increase. No details about what this prediction is based on. Makes sense, though. The SolarWinds attack was incredibly successful for the Russian SVR, and…
-
(ISC)2 Offers 100,000 Free Entry-Level Certification Places
PRIVACY PRIVACY The 100K in the UK scheme is aimed at recent graduates and career changers seeking to work in cyber Read More
-
Challenges that impact the Cybersecurity talent pipeline
PRIVACY PRIVACY Cyberattacks are alarming, and establishments must increase protections, embrace a layered attitude, and cultivate security-conscious users to combat growing concerns. Cybersecurity leaders are being inundated with talent development resources offered, encompassing hiring, recruitment, and retention of the talent pipeline. Fifty percent of hiring managers typically deem that their candidates aren’t highly qualified. Globally,…
-
Rezilion launches Dynamic SBOM for software supply chain devsecops
PRIVACY PRIVACY Aiming to help organizations manage security across the software development life cycle (SDLC), devsecops platform developer Rezilion is launching Dynamic SBOM (software bill of materials), an application designed to plug into an organization’s software environment to examine how multiple components are being executed in runtime, and reveal bugs and vulnerabilities. To read this…
-
Fifth of Businesses Say Cyber-Attack Nearly Broke Them
PRIVACY PRIVACY Attacks surge 12% in 2021, according to leading insurer Read More
-
CISOs worried about material attacks, boardroom backing
PRIVACY PRIVACY The threat of substantial material attacks and getting board support for their efforts are top-of-mind issues among the world’s CISOs, according to a new report released by Proofpoint Tuesday. While nearly half of the 1,400 CISOs surveyed for the annual Voice of the CISO report (48%) say their organization is at risk of…
-
China’s cyber espionage focus: intellectual property theft
PRIVACY PRIVACY Chinese focus on the acquisition of intellectual property is a recurring topic, percolating to the forefront, the most recent being Operation CuckooBees, which has been detailed in a comprehensive Cybereason report. The report noted that the Chinese advanced persistent threat (APT) group has had many labels including Winnti and APT41 and is credited…
-
MITRE ATT&CK v11 adds ICS matrix, sub-techniques for mobile threats
PRIVACY PRIVACY The MITRE Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) Framework has become a mainstay of the cybersecurity industry. The framework represents relevant adversary behavior, and organizations can leverage it to bolster their cybersecurity defenses and improve their ability to detect common adversary behavior. It details adversary behavior across the attack lifecycle. The framework…
-
US and EU Move Closer on Cyber in New Trade Pact
PRIVACY PRIVACY Range of initiatives will push back against Russia and China Read More