March, 2020

article thumbnail

Security Lessons We've Learned (So Far) from COVID-19

Dark Reading

Takeaways about fighting new fires, securely enabling remote workforces, and human nature during difficult times.

Security 121
article thumbnail

DOD Warns of Cyber Risks as Employees Work From Home

Data Breach Today

Defense Department to Issue Detailed Security Guidance As more of its employees shift to working from home due to the COVID-19 pandemic, the U.S. Department of Defense is warning workers to take security precautions to guard against potential hackers. It plans to release detailed guidance soon.

Risk 314
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Should Location Data Be Used in Battle Against COVID-19?

Data Breach Today

US, UK, Other Nations in Talks With Tech Firms to Provide Information The Trump administration is reportedly in talks with tech companies, including Facebook and Google, to explore whether it's possible to use real-time location data from smartphones to support efforts to slow the spread of COVID-19. But some privacy advocates are raising concerns about such tracking efforts.

Privacy 311
article thumbnail

Limited-Time Free Offers to Secure the Enterprise Amid COVID-19

Dark Reading

These products and services could be of immediate help to infosec pros now protecting their organizations while working from home.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

A Critical Internet Safeguard Is Running Out of Time

WIRED Threat Level

Shadowserver has helped keep the internet safe for 15 years. Unless it can raise funds fast, it's going to disappear.

IT 104

More Trending

article thumbnail

COVID-19 Response: How to Secure a 100% Remote Workforce

Data Breach Today

Cybereason CSO Sam Curry on Business Continuity and Reducing Risk Cybereason CSO Sam Curry is no stranger to crisis - he was on the team that responded to the RSA breach in 2011. But the COVID-19 pandemic brings an unprecedented challenge: How do you manage business continuity and reduce risk with a 100 percent remote workforce? Curry shares strategies and lessons learned.

Risk 243
article thumbnail

What Cybersecurity Pros Really Think About Artificial Intelligence

Dark Reading

While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.

article thumbnail

Uncertain Markets May Drive Cybersecurity Consolidation

Data Breach Today

Experts: This Week's 'Black Monday' Likely to Accelerate Security M&A Activity With U.S. stock markets suffering their worst day since 1987 on Monday, most technology firms took a hit as Wall Street continues to be rattled by the COVID-19 crisis. Experts predict this will drive fresh waves of consolidation and M&A in the cybersecurity market, as well as growth in hot areas.

Marketing 246
article thumbnail

Living and Working Amid COVID-19 Crisis

Data Breach Today

Quarantines, lockdowns, supply chain disruptions and the biggest remote workforce in history. These all part of the "new normal" in the shadow of the COVID-19 pandemic. Business continuity expert Regina Phelps has some new advice for how businesses and individuals should approach the next crucial weeks.

213
213
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Live Coronavirus Map Used to Spread Malware

Krebs on Security

Cybercriminals constantly latch on to news items that captivate the public’s attention, but usually they do so by sensationalizing the topic or spreading misinformation about it. Recently, however, cybercrooks have started disseminating real-time, accurate information about global infection rates tied to the Coronavirus/COVID-19 pandemic in a bid to infect computers with malicious software.

Passwords 364
article thumbnail

NEW TECH: Byos pushes ‘micro segmentation’ approach to cybersecurity down to device level

The Last Watchdog

Many companies take an old-school approach to bringing up the rear guard, if you will, when it comes to protecting IT assets. It’s called network segmentation. The idea is to divide the network up into segments, called subnetworks, to both optimize performance as well as strengthen security. Related: A use case for endpoint encryption At RSA 2020 in San Francisco recently, I learned about how something called “micro segmentation” is rapidly emerging as a viable security strategy.

article thumbnail

COVID-19 and the Importance of the Digital Workplace

AIIM

It seems like everyone is talking about coronavirus : what it means to the global and local economies, how it impacts different industries, even how to make your own hand sanitizer to combat it. One of the key approaches many organizations are taking is to minimize sustained contact with large groups of people. This has led to the cancellation of numerous conferences and other events; many schools and universities are asking students to stay home and participate remotely.

Paper 191
article thumbnail

Your colleague was infected with Coronavirus, this is the latest phishing lure

Security Affairs

Security experts uncovered a new Coronavirus-themed phishing campaign, the messages inform recipients that they have been exposed to the virus. Experts continue to spot Coronavirus-themed attack, a new phishing campaign uses messages that pretend to be from a local hospital informing the victims they have been exposed to the virus and that they need urgently to be tested.

Phishing 145
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

IBM SPSS Statistics free trial extended through June 15 due to pandemic

IBM Big Data Hub

We recognize that these are difficult times. In response to the worldwide pandemic, IBM will be extending the SPSS Statistics Subscription trial for active and new accounts through June 15. This will allow our users time to adjust to this dynamic and unprecedented situation.

145
145
article thumbnail

COVID-19 Phishing Schemes Escalate; FBI Issues Warning

Data Breach Today

Latest Schemes Target At-Home Employees; Some Spoof Health Agencies As the global COVID-19 pandemic worsens, security firms and law enforcement, including the FBI, are warning of increasing phishing and other the cybercriminal scams targeting a largely at-home workforce.

Phishing 362
article thumbnail

FBI Arrests Alleged Owner of Deer.io, a Top Broker of Stolen Accounts

Krebs on Security

FBI officials last week arrested a Russian computer security researcher on suspicion of operating deer.io , a vast marketplace for buying and selling stolen account credentials for thousands of popular online services and stores. Kirill V. Firsov was arrested Mar. 7 after arriving at New York’s John F. Kennedy Airport, according to court documents unsealed Monday.

Sales 310
article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Speed is what digital transformation is all about. Organizations are increasingly outsourcing IT workloads to cloud service providers and looking to leverage IoT systems. Related: The API attack vector expands Speed translates into innovation agility. But it also results in endless ripe attack vectors which threat actors swiftly seek out and exploit.

Cloud 226
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

The First Step to Effective Working from Home: Digitize your Paper Documents

AIIM

Many of us find ourselves working from home – often rather suddenly and unexpectedly. Organizations of all sizes and in all industries are now in the position of figuring out how to ensure that the business of the business continues while staff stay home and practice effective social distancing. The good news is that the technology needed for effective working from home exists and is generally mature – though some providers have found that the sudden surge in volume can cause issues with particu

Paper 178
article thumbnail

Russia-linked APT28 has been scanning vulnerable email servers in the last year

Security Affairs

Experts warn of scanning activity conducted by Russia-linked APT28 cyberespionage group, hackers are searching for vulnerable mail servers. According to security researchers from Trend Micro, the Russia-linked APT28 cyberespionage group has been scanning vulnerable email servers for more than a year. The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizati

Phishing 145
article thumbnail

Types of Enterprise Architecture Frameworks: ArchiMate, TOGAF, DoDAF and more

erwin

An enterprise architecture framework is a standardized methodology that organizations use to create, describe and change their enterprise architectures. Enterprise architecture (EA) itself describes the blueprint and structure of an organization’s systems and assets. It’s needed to make informed changes that help bridge the gap between the enterprise architecture’s current and desired future state.

article thumbnail

Zoom Stops Transferring Data by Default to Facebook

Data Breach Today

Privacy Gaffe Blamed on Facebook's iOS Software Development Kit Zoom has apologized for sharing large sets of user data by default with Facebook, blaming the social network's software development kit, which it has removed from its iOS app. With COVID-19 driving unprecedented levels of remote working, video conferencing software is under the privacy and security microscope.

Privacy 345
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

US Government Sites Give Bad Security Advice

Krebs on Security

Many U.S. government Web sites now carry a message prominently at the top of their home pages meant to help visitors better distinguish between official U.S. government properties and phishing pages. Unfortunately, part of that message is misleading and may help perpetuate a popular misunderstanding about Web site security and trust that phishers have been exploiting for years now.

article thumbnail

NEW TECH: Security Compass streamlines the insertion of security best practices into DevOps

The Last Watchdog

DevOps is now table stakes for any company hoping to stay competitive. Speed and agility is the name of the game. And everyone’s all-in. Related: A firewall for microservices DevSecOps arose to insert security checks and balances into DevOps, aiming to do so without unduly degrading speed and agility. If you’re thinking that speed and security are like oil and water, you’re right.

Security 194
article thumbnail

New to Remote Working? Tapping Into 6+ Years of Tips for Working from Home

AIIM

For many across the globe, limiting their human contact, the home has become…well, home base for just about everything. Folks are taking advantage of virtual meeting software like GoToMeeting and Zoom to video chat with friends, host virtual dinner parties, and even play board games! And that’s just in our personal lives. In our work lives, companies are piecing together Digital Workplace strategies to allow their employees to work from home.

article thumbnail

Ryuk Ransomware operators continue to target hospitals during COVID19 outbreak

Security Affairs

Operators behind the Ryuk Ransomware continue to target hospitals even as these organizations are involved in the fight against the Coronavirus pandemic. The threat actors behind the infamous Ryuk Ransomware continue to target hospitals, even as they are involved in containing the Coronavirus outbreak. The decision of the operators is not aligned with principal ransomware gangs that have announced they will no longer target health and medical organizations during the Coronavirus (COVID-19) pande

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

The Cutting Edge of Behavioral Biometrics

Data Breach Today

SecuredTouch CEO Alasdair Rambaud on 2020 Innovations Behavioral biometrics is seeing wide adoption and is helping organizations proactively fight fraud, says Alasdair Rambaud, CEO at SecuredTouch. who describes the latest innovations.

326
326
article thumbnail

Coronavirus Cybercrime Victims: Please Come Forward

Data Breach Today

Businesses Asked to Report COVID-19-Themed Crime to Police As cybercriminals and nation-states take advantage of the COVID-19 pandemic to further their own aims, authorities are calling on victims to report online attacks as quickly as possible to help them better disrupt such activity.

324
324
article thumbnail

PwndLocker: Free Decryptor Frees Crypto-Locked Data

Data Breach Today

Ransomware Debuted in Late 2019; Gang's Ransom Demands Have Hit $660,000 in Bitcoins Security firm Emsisoft is offering free, customized decryptors to victims of PwndLocker ransomware, which first surfaced in late 2019 and has been tied to attacks against Lasalle County in Illinois and the Serbian city of Novi Sad, with the gang demanding up to $660,000 or more in bitcoins from its victims.