Cybersecurity News
Billions of Devices Open to Wi-Fi Eavesdropping Attacks

26 February 2020
RSAC 2020: Smart Baby Monitor Vulnerable to Remote Hackers

26 February 2020
Tufin: How to Make Better Sense of the Cloud Security Equation
CEO Reuven Harrison examines how cloud services have changed how enterprises manage their apps and data, and also offers some tips for security pros tasked with managing either hybrid- or multi-cloud implementations. Harrison also takes on Kubernetes and container security in this News Desk interview.26 February 2020
RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks

26 February 2020
How Should I Answer a Nontech Exec Who Asks, 'How Secure Are We?'
Consider this your opportunity to educate.26 February 2020
US State Dept. Shares Insider Tips to Fight Insider Threats
The insider threat is a technology, security, and personnel issue, officials said in explaining an approach that addresses all three factors.26 February 2020
Six suspected drug dealers went free after police lost evidence in ransomware attack
Seventh incident of its kind when police investigations were impacted by a ransomware infection.26 February 2020
Sophos Boosts Threat Hunting, Managed Detection and Response Capabilities
JJ Thompson, senior director of managed threat response for Sophos digs deep into how organizations can start to make sense of the seemingly unlimited data that's available from endpoints, cloud, and on-premises networks. And that's a critical capability as attacker behaviors start to change.26 February 2020
Elastic Security Makes Case For Blending 'Human Element,' Election Security
Nate Fick, general manager of Elastic and former CEO of Endgame, talks about the impact of AI and machine learning on security professionals, and how what technologies can be tapped to improve security in the runup to November's election.26 February 2020
How to Prevent an AWS Cloud Bucket Data Leak

26 February 2020
How to Prevent a AWS Cloud Bucket Data Leak

26 February 2020
Commonsense Security: Leveraging Dialogue & Collaboration for Better Decisions
Sometimes, good old-fashioned tools can help an enterprise create a cost-effective risk management strategy.26 February 2020
Is bug hunting a viable career choice?
With earnings of top ethical hackers surpassing hundreds of thousands of dollars, some would say yes
The post Is bug hunting a viable career choice? appeared first on WeLiveSecurity
26 February 2020
Hackers Cashing In On Healthcare Industry Security Weaknesses

26 February 2020
Open Cybersecurity Alliance Releases New Language for Security Integration
OpenDXL Ontology is intended to allow security components to interoperate right out of the box.26 February 2020
Next-Gen SOC Is On Its Way and Here's What It Should Contain
The next-gen-SOC starts with the next-gen SIEM, and Jason Mical of Devo Technology and Kevin Golas from OpenText talk about what capabilities are required, including threat hunting and greater automation, and how security professionals should exploit the tools.26 February 2020
Here's how to enable DoH in each browser, ISPs be damned
DoH support is already present in all major browsers. Users just have to enable it and configure it.26 February 2020
Kr00k Wi-Fi Vulnerability Affected a Billion Devices
Routers and devices with Broadcom and Cypress Wi-Fi chipsets could be forced to sometimes use encryption keys consisting of all zeroes. Now patched, the issue affected a billion devices, including those from Amazon, Apple, Google, and Samsung.26 February 2020
New Kr00k vulnerability lets attackers decrypt WiFi packets
Kr00k affects devices using Broadcom and Cypress Wi-Fi chips.26 February 2020
5 Ways to Up Your Threat Management Game
Good security programs start with a mindset that it's not about the tools, it's what you do with them. Here's how to get out of a reactive fire-drill mode with vulnerability management.26 February 2020