NEW: At
#RSAC2020
,
@Cisco
unveiled SecureX, which integrates the vendor's security portfolio into a single platform with enhanced visibility and automation.
#RSAC
@RobWright22
The
#cybersecurity
field now features distinct career paths with milestones to be met and requirements to fulfill. Learn more in
@ISSAINTL
's 5 step model to success in
#infosec
.
@szurier
This
#BlackHistoryMonth
, we join
@BlackGirlsCode
in recognizing mathematician Gladys West, whose calculations and programming expertise helped create GPS. 📍
We stand on the shoulders of those who came before us. We teamed up with one of our
#futuretechbosses
Nia Amsemota to sprinkle some
#BlackHistory
on your feed throughout the entire month. Today, we're honoring Mathematician Gladys West!
#BlackHistory
#BlackHERStory
New
@ISC2
research puts the
#cybersecurity
workforce shortage at roughly 2.93 million globally, with the demand versus supply of
#security
professionals in Asia-Pacific far outpacing all other regions combined.
NEW: The operators of Maze
#ransomware
claim to have breached LG, offering three screenshots as proof. One of those screenshots features LG product source code.
@culafia
.
@GossiTheDog
, a security researcher based in the U.K., said the Pulse Secure
#VPN
vulnerability -- which was originally patched in April 2019 -- has been targeted in
#ransomware
attacks recently.
🔔 BREAKING --
@KaseyaCorp
has obtained the decryption key for the massive
#ransomware
attack it suffered earlier this month, but the company won't say how other than that it came from a "trusted third party."
#REvil
Here's how to prevent the top 5
#cybersecurity
vulnerabilities, from end-user gullibility, inadequate network monitoring or poor
#endpoint
security defenses.
#Cybersecurity
intelligence vendor
@RiskIQ
found that 69,548 servers remained unpatched as of Sunday and are vulnerable to attacks, with nearly 17,000 servers located in the U.S.
@TechTargetNews
.
@Bugcrowd
has introduced Attack Surface Management, an asset discovery and prioritization tool aimed to reduce enterprises' security risks from
#ShadowIT
assets.
"The data in the cloud is still stored in a data center, and it can still be accessed by hackers via many of the same methods they have always used…" -
@rdshapland
on the 12 biggest
#cloudsecurity
threats, according to the CSA
"By using
#SecurityChaosEngineering
and conducting experiments, you get to understand your systems... You build muscle memory around how to respond to failure and how to respond to incidents."
--
@fastly
's
@swagitda_
Siemens patched just 3 of 54 disclosed bugs. 🐜
@MT_Heller
spoke to
@ReverseICS
, a vulnerability researcher at
@DragosInc
, who said ICS needs better patching processes.
Looking for a
#ThreatModeling
tool? This article provides a comprehensive guide on what to consider when selecting one, along with a list of top tools in the market. From
#OpenSource
to commercial programs, there's something for every organization's needs.
Agencies across the federal government, including
@NSF
, are getting the ball rolling on
#CHIPSAct
funding, supporting tech innovation programs and workforce development efforts to boost U.S. competitiveness in areas like
#semiconductors
,
#AI
.
@forrester
Attention,
#infosec
beginners: Author of "How
#Cybersecurity
Really Works" discusses the best -- and worst -- ways to learn the fundamentals.
@nostarch
HPE's
@bryanjthompson
talks about how
@HPE_GreenLake
has become synonymous with the brand, and looks to its future and how the platform will meet customers' specific needs.
#Cyberinsurance
can help companies successfully navigate the aftereffects of a
#DataBreach
. But choosing the right policy can be confusing.
@SherriDavidoff
of
@LMGSecurity
tells you how in this excerpt of her new book "Data Breaches: Crisis and Opportunity." 👇
Read an excerpt of Chapter 6: Network Tapping from "How
#Cybersecurity
Really Works" by Sam Grubb, a consultant and former
#infosec
educator.
@nostarch
Researchers at Duo Security discovered a
#SAML
vulnerability that enabled attackers to dupe single sign-on systems. Expert Michael Cobb of
@thehairyITdog
explains how the exploit works.
The use of buckets can provide
#cloudsecurity
benefits for enterprises, but they also come with some risks. Expert
@FrankSiemons
of
@InfosecEdu
discusses the risks and how to mitigate them.
The
#cloudsecurity
threats that are the most dangerous may overlap with the risks to traditional storage. Expert
@rdshapland
explains the biggest risks, according to the CSA
🎙 In this week's Risk & Repeat podcast, editors look at the biggest
#DataBreach
disclosures from the second half of 2019 and examine the trends around them. 📈
@RobWright22
@culafia
Hackers launched
@netflix
#phishing
attacks by obtaining TLS certificates. Learn how hackers mimic popular websites to spoof users and steal
#UserData
from expert Michael Cobb of
@thehairyITdog
.
CISA released guidance for federal organizations that use on-premises
#MSExchange
servers, requiring that they run two Microsoft scanning tools to check for compromise.
@TechTargetNews