Cybersecurity News


State of Cybersecurity Incident Response

State of Cybersecurity Incident Response Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
27 February 2020

Got Backups?

Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information at home (such as family photos) on a regular basis.
27 February 2020

Billions of Devices Open to Wi-Fi Eavesdropping Attacks

Billions of Devices Open to Wi-Fi Eavesdropping Attacks The Kr00k bug arises from an all-zero encryption key in Wi-Fi chips that reveals communications from devices from Amazon, Apple, Google, Samsung and others.
26 February 2020

RSAC 2020: Smart Baby Monitor Vulnerable to Remote Hackers

RSAC 2020: Smart Baby Monitor Vulnerable to Remote Hackers A popular baby monitor has been found riddled with vulnerabilities that give attackers full access to personal information and sensitive video footage.
26 February 2020

Tufin: How to Make Better Sense of the Cloud Security Equation

CEO Reuven Harrison examines how cloud services have changed how enterprises manage their apps and data, and also offers some tips for security pros tasked with managing either hybrid- or multi-cloud implementations. Harrison also takes on Kubernetes and container security in this News Desk interview.
26 February 2020

RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks

RSAC 2020: Lack of Machine Learning Laws Open Doors To Attacks When it comes to machine learning, research and cybercriminal activity is full speed ahead - but legal policy has not yet caught up.
26 February 2020

How Should I Answer a Nontech Exec Who Asks, 'How Secure Are We?'

Consider this your opportunity to educate.
26 February 2020

US State Dept. Shares Insider Tips to Fight Insider Threats

The insider threat is a technology, security, and personnel issue, officials said in explaining an approach that addresses all three factors.
26 February 2020

Six suspected drug dealers went free after police lost evidence in ransomware attack

Seventh incident of its kind when police investigations were impacted by a ransomware infection.
26 February 2020

Sophos Boosts Threat Hunting, Managed Detection and Response Capabilities

JJ Thompson, senior director of managed threat response for Sophos digs deep into how organizations can start to make sense of the seemingly unlimited data that's available from endpoints, cloud, and on-premises networks. And that's a critical capability as attacker behaviors start to change.
26 February 2020

Elastic Security Makes Case For Blending 'Human Element,' Election Security

Nate Fick, general manager of Elastic and former CEO of Endgame, talks about the impact of AI and machine learning on security professionals, and how what technologies can be tapped to improve security in the runup to November's election.
26 February 2020

How to Prevent an AWS Cloud Bucket Data Leak

How to Prevent an AWS Cloud Bucket Data Leak Misconfigured AWS buckets have led to huge data breaches. Following a handful of practices will help keep you from becoming the next news story.
26 February 2020

How to Prevent a AWS Cloud Bucket Data Leak

How to Prevent a AWS Cloud Bucket Data Leak Misconfigured AWS buckets have led to huge data breaches. Following a handful of practices will help keep you from becoming the next news story.
26 February 2020

Commonsense Security: Leveraging Dialogue & Collaboration for Better Decisions

Sometimes, good old-fashioned tools can help an enterprise create a cost-effective risk management strategy.
26 February 2020

Is bug hunting a viable career choice?

With earnings of top ethical hackers surpassing hundreds of thousands of dollars, some would say yes

The post Is bug hunting a viable career choice? appeared first on WeLiveSecurity

26 February 2020

Hackers Cashing In On Healthcare Industry Security Weaknesses

Hackers Cashing In On Healthcare Industry Security Weaknesses Between ransomware attacks on healthcare devices, malware-laced “medical” apps, and fraud services available on the dark net, attackers are pushing the boundaries on targeting healthcare.
26 February 2020

Open Cybersecurity Alliance Releases New Language for Security Integration

OpenDXL Ontology is intended to allow security components to interoperate right out of the box.
26 February 2020

Next-Gen SOC Is On Its Way and Here's What It Should Contain

The next-gen-SOC starts with the next-gen SIEM, and Jason Mical of Devo Technology and Kevin Golas from OpenText talk about what capabilities are required, including threat hunting and greater automation, and how security professionals should exploit the tools.
26 February 2020

Here's how to enable DoH in each browser, ISPs be damned

DoH support is already present in all major browsers. Users just have to enable it and configure it.
26 February 2020

Kr00k Wi-Fi Vulnerability Affected a Billion Devices

Routers and devices with Broadcom and Cypress Wi-Fi chipsets could be forced to sometimes use encryption keys consisting of all zeroes. Now patched, the issue affected a billion devices, including those from Amazon, Apple, Google, and Samsung.
26 February 2020