News - Article Archives - Page 7

Most Small to Mid-Sized Organizations Don't Use Multi-Factor Authentication

|

And just 48 percent of small to mid-sized organizations think their current password policy is good enough, a recent survey found.

READ MORE

Top 10 Enterprise Encryption Products

|

Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.

READ MORE

Over a Third of Healthcare IoT Organizations Suffered Cyber Incidents in the Past Year

|

And almost a third said dealing with the risks of legacy connected devices is their greatest cyber security challenge, a recent survey found.

READ MORE

ICS Security Firm Dragos Raises $10M

|

VIDEO: Rob Lee, CEO and Founder of Dragos discusses his Black Hat USA session on the Crash Override attack.

READ MORE

Creditseva, KS Enterprises Breaches Highlight Need for Improved Cloud Security

|

A massive exposure of data in misconfigured Amazon S3 buckets demonstrates the urgent need for companies to adjust their approach to cloud security.

READ MORE

The DDoS Threat: Ukraine's Postal Service Hit by Two-Day Attack

|

By the end of the second day, Ukrposhta said services were back up and running, though slowly and with interruptions.

READ MORE

Git, SVN and Mercurial Open-Source Version Control Systems Update for Critical Security Vulnerability

|

The three major open-source version control systems were all at risk from a flaw that could enable arbitrary code execution.

READ MORE

Simple Phishing Attacks Deliver Complex Malware: FIN7 Hackers Target Restaurant Chains

|

The FIN7/Carbanak hacker group is leveraging straightforward phishing emails to deliver a new JScript backdoor called Bateleur.

READ MORE

The Importance of Effective Incident Response: the HBO Breach Expands

|

The attackers leaked more data, and demanded millions of dollars in bitcoin to prevent future leaks.

READ MORE

Google Patches Android for 49 Vulnerabilities in August Update

|

Once again, Google's media framework is home to the bulk of the patched issues.

READ MORE

AlienVault Scours the Dark Web for Compromised Credentials

|

The company's new security-monitoring solution delves into the dark web to spot the illicit sharing of stolen user credentials.

READ MORE

IoT on Wheels: U.K. Government Issues Cyber Security Guidelines for Self-Driving Cars

|

The government recently published eight key principles to help manufacturers improve vehicle cyber security.

READ MORE

Cybersecurity Services Provider BlueteamGlobal Raises $125 Million

|

The company will offer threat monitoring and cyber defense security services to enterprises and SMBs.

READ MORE

19 Top UEBA Vendors

|

User and entity behavior analytics uses machine learning to protect against insider threats and external attacks. We review the top UEBA products.

READ MORE

Researchers Add Profile-Based Anomaly Detection to SIEM

|

FKIE researchers say combining indicators can significantly reduce false positives.

READ MORE

U.S. Senators Seek to Improve IoT Security, Encourage Security Research

|

The Internet of Things Cybersecurity Improvement Act sets minimum requirements for the security of IoT devices purchased by the government.

READ MORE

Cybersecurity Startup GuardiCore Raises $15 Million

|

The company's threat detection platform uses deception-based and security intelligence technologies to thwart attacks. 

READ MORE

The Adventures of Anti-Virus and the Leaky Sandbox

|

VIDEO: SafeBreach co-founder and CTO Itzik Kotler and VP of Security Research Amit Klein provide an overview of their Black Hat session on how to exploit anti-virus vendors.

READ MORE

New Anthem Breach Underscores the Need for Effective Cyber Risk Management

|

An insider breach at a third party vendor exposed thousands of Anthem members' PHI.

READ MORE

Should the Internet be Secure by Default? Facebook CSO Says No

|

VIDEO: Facebook CSO Alex Stamos explains why security shouldn't be baked into the fabric of the internet and why researchers remain attracted to zero-day vulnerabilities.

READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|