SecurityTicks

New infosec products of the week: June 9, 2023

New infosec products of the week: June 9, 2023 09/06/2023 at 08:00 By Help Net Security Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Datadog, Enveedo, Lacework, and NinjaOne. Lacework simplifies cloud security with risk calculation on users’ permissions Lacework announced new CIEM functionality to address the […]

React to this headline:

Loading spinner

New infosec products of the week: June 9, 2023 Read More »

Education pathways to corporate security careers

Education pathways to corporate security careers 09/06/2023 at 08:00 By Security professionals aiming to advance their careers have many educational opportunities available to them, including degree programs, certifications & more.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Education pathways to corporate security careers Read More »

Assessments and comprehensive security planning in higher education

Assessments and comprehensive security planning in higher education 09/06/2023 at 08:00 By With the growing conversation around school safety, building security solutions within higher education requires detailed planning and routine assessments.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Assessments and comprehensive security planning in higher education Read More »

Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition

Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition 09/06/2023 at 07:02 By Help Net Security In this Help Net Security video interview, Alan Watkins, CIS Controls Ambassador, CIS, talks about his new book – Creating a Small Business Cybersecurity Program, Second Edition. This book provides guidance and essential steps small businesses with

React to this headline:

Loading spinner

Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition Read More »

Employee cybersecurity awareness takes center stage in defense strategies

Employee cybersecurity awareness takes center stage in defense strategies 09/06/2023 at 06:31 By Help Net Security As cyberattacks intensify, more and more organizations recognize the need to have a strong security culture for all employees, according to Fortinet. Employee cybersecurity awareness The most recent report from Fortinet’s FortiGuard Labs found that ransomware threats remain at

React to this headline:

Loading spinner

Employee cybersecurity awareness takes center stage in defense strategies Read More »

Factors influencing IT security spending

Factors influencing IT security spending 09/06/2023 at 06:13 By Help Net Security Security executives are overwhelmingly craving more AI solutions in 2023 to help them battle the growing cybersecurity threat landscape, according to Netrix Global. 22% of respondents said that they would like to see more AI used in cybersecurity this year, nearly five times

React to this headline:

Loading spinner

Factors influencing IT security spending Read More »

48% of security leaders say distributed workforce influences spending

48% of security leaders say distributed workforce influences spending 08/06/2023 at 21:18 By The quick development of artificial intelligence and new technologies has led security leaders to consider how to implement them in cybersecurity. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

48% of security leaders say distributed workforce influences spending Read More »

37% of IT professionals report experiencing a data loss event

37% of IT professionals report experiencing a data loss event 08/06/2023 at 21:01 By Best practices for data protection were analyzed in a report finding that 25% of IT professionals follow industry best practices for backing up data. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to

React to this headline:

Loading spinner

37% of IT professionals report experiencing a data loss event Read More »

Josh DeFrain named Chief Information Security Officer at Rokt

Josh DeFrain named Chief Information Security Officer at Rokt 08/06/2023 at 21:01 By Ecommerce technology company Rokt has appointed Josh DeFrain as Chief Information Security Officer (CISO) effective immediately.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Josh DeFrain named Chief Information Security Officer at Rokt Read More »

Why nonprofits need to be more worried about cybersecurity

Why nonprofits need to be more worried about cybersecurity 08/06/2023 at 19:22 By It can be tempting to think that a nonprofit is under the radar of any cybercriminals. But they’re the exact target cybercriminals look for. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this

React to this headline:

Loading spinner

Why nonprofits need to be more worried about cybersecurity Read More »

Essential Cybersecurity Compliance Standards

Essential Cybersecurity Compliance Standards 08/06/2023 at 18:48 By With the continued expansion of your attack surface, cybersecurity compliance has become more important than ever. Gain an overview of the most popular compliance standards, including HIPAA, NIST, ISO, and PCI DSS, to safeguard your business against potential risks. This article is an excerpt from Trend Micro

React to this headline:

Loading spinner

Essential Cybersecurity Compliance Standards Read More »

Guide to Serverless Architecture Design Patterns

Guide to Serverless Architecture Design Patterns 08/06/2023 at 18:48 By Discover the power of serverless architecture design patterns for scalable and efficient application development. Explore EDA, pub-sub, fan-out/fan-in, strangler, and saga patterns. Learn how to select, implement, and optimize them for your needs. This article is an excerpt from Trend Micro Research, News and Perspectives

React to this headline:

Loading spinner

Guide to Serverless Architecture Design Patterns Read More »

Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data

Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data 08/06/2023 at 18:48 By Eduard Kovacs Vulnerabilities found by a researcher in a Honda ecommerce platform used for equipment sales exposed customer and dealer information. The post Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data Read More »

Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack

Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack 08/06/2023 at 18:48 By Ionut Arghire Japanese pharmaceutical company Eisai says it has taken systems offline after falling victim to a ransomware attack. The post Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS

React to this headline:

Loading spinner

Pharmaceutical Giant Eisai Takes Systems Offline Following Ransomware Attack Read More »

Consolidate Vendors and Products for Better Security

Consolidate Vendors and Products for Better Security 08/06/2023 at 18:48 By John Maddison Instead of deploying new point products, CISOs should consider sourcing technologies from vendors that develop products designed to work together as part of a platform.  The post Consolidate Vendors and Products for Better Security appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Consolidate Vendors and Products for Better Security Read More »

North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft

North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft 08/06/2023 at 18:48 By Ionut Arghire Researchers believe North Korea-linked Lazarus Group has stolen at least $35 million in cryptocurrency from Atomic Wallet. The post North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

North Korean Hackers Blamed for $35 Million Atomic Wallet Crypto Theft Read More »

How to Improve Your API Security Posture

How to Improve Your API Security Posture 08/06/2023 at 18:15 By APIs, more formally known as application programming interfaces, empower apps and microservices to communicate and share data. However, this level of connectivity doesn’t come without major risks. Hackers can exploit vulnerabilities in APIs to gain unauthorized access to sensitive data or even take control

React to this headline:

Loading spinner

How to Improve Your API Security Posture Read More »

Clop Ransomware Gang Likely Exploiting MOVEit Transfer Vulnerability Since 2021

Clop Ransomware Gang Likely Exploiting MOVEit Transfer Vulnerability Since 2021 08/06/2023 at 18:15 By The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have published a joint advisory regarding the active exploitation of a recently disclosed critical flaw in Progress Software’s MOVEit Transfer application to drop ransomware. “The Cl0p Ransomware Gang, also

React to this headline:

Loading spinner

Clop Ransomware Gang Likely Exploiting MOVEit Transfer Vulnerability Since 2021 Read More »

Experts Unveil PoC Exploit for Recent Windows Vulnerability Under Active Exploitation

Experts Unveil PoC Exploit for Recent Windows Vulnerability Under Active Exploitation 08/06/2023 at 18:15 By Details have emerged about a now-patched actively exploited security flaw in Microsoft Windows that could be abused by a threat actor to gain elevated privileges on affected systems. The vulnerability, tracked as CVE-2023-29336, is rated 7.8 for severity and concerns an

React to this headline:

Loading spinner

Experts Unveil PoC Exploit for Recent Windows Vulnerability Under Active Exploitation Read More »

FTC charges Amazon for keeping children’s voice recordings

FTC charges Amazon for keeping children’s voice recordings 08/06/2023 at 17:47 By Amazon will be required to overhaul how it deletes data and implement new privacy guidelines following FTC and Department of Justice charges. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

FTC charges Amazon for keeping children’s voice recordings Read More »

Scroll to Top