News

  • Terrascan Joins the Nessus Community, Enabling Nessus To Validate Modern Cloud Infrastructures

    PRIVACY PRIVACY The addition of Terrascan to the Nessus family of products helps users better secure cloud native infrastructure by identifying misconfigurations, security weaknesses, and policy violations by scanning Infrastructure as Code repositories.  Twenty-three years ago when Nessus was created by Renaud Deraison, the computers the scan engine was designed for were physically attached to…

    Read More

  • Attacks on Managed Service Providers Expected to Increase

    PRIVACY PRIVACY CISA, NSA, FBI, and similar organizations in the other Five Eyes countries are warning that attacks on MSPs — as a vector to their customers — are likely to increase. No details about what this prediction is based on. Makes sense, though. The SolarWinds attack was incredibly successful for the Russian SVR, and…

    Read More

  • (ISC)2 Offers 100,000 Free Entry-Level Certification Places

    PRIVACY PRIVACY The 100K in the UK scheme is aimed at recent graduates and career changers seeking to work in cyber Read More

    Read More

  • Challenges that impact the Cybersecurity talent pipeline

    PRIVACY PRIVACY Cyberattacks are alarming, and establishments must increase protections, embrace a layered attitude, and cultivate security-conscious users to combat growing concerns. Cybersecurity leaders are being inundated with talent development resources offered, encompassing hiring, recruitment, and retention of the talent pipeline. Fifty percent of hiring managers typically deem that their candidates aren’t highly qualified. Globally,…

    Read More

  • Rezilion launches Dynamic SBOM for software supply chain devsecops

    PRIVACY PRIVACY Aiming to help organizations manage security across the software development life cycle (SDLC), devsecops platform developer Rezilion is launching Dynamic SBOM (software bill of materials), an application designed to plug into an organization’s software environment to examine how multiple components are being executed in runtime, and reveal bugs and vulnerabilities. To read this…

    Read More

  • Fifth of Businesses Say Cyber-Attack Nearly Broke Them

    PRIVACY PRIVACY Attacks surge 12% in 2021, according to leading insurer Read More

    Read More

  • CISOs worried about material attacks, boardroom backing

    PRIVACY PRIVACY The threat of substantial material attacks and getting board support for their efforts are top-of-mind issues among the world’s CISOs, according to a new report released by Proofpoint Tuesday. While nearly half of the 1,400 CISOs surveyed for the annual Voice of the CISO report (48%) say their organization is at risk of…

    Read More

  • China’s cyber espionage focus: intellectual property theft

    PRIVACY PRIVACY Chinese focus on the acquisition of intellectual property is a recurring topic, percolating to the forefront, the most recent being Operation CuckooBees, which has been detailed in a comprehensive Cybereason report. The report noted that the Chinese advanced persistent threat (APT) group has had many labels including Winnti and APT41 and is credited…

    Read More

  • MITRE ATT&CK v11 adds ICS matrix, sub-techniques for mobile threats

    PRIVACY PRIVACY The MITRE Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) Framework has become a mainstay of the cybersecurity industry. The framework represents relevant adversary behavior, and organizations can leverage it to bolster their cybersecurity defenses and improve their ability to detect common adversary behavior. It details adversary behavior across the attack lifecycle. The framework…

    Read More

  • US and EU Move Closer on Cyber in New Trade Pact

    PRIVACY PRIVACY Range of initiatives will push back against Russia and China Read More

    Read More

News, Advisories and much more

Exit mobile version