Established network security players like Check Point are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains. This article has been indexed from Dark Reading Read the original article: Check Point…
Category: Dark Reading
Inglis Retires as National Cyber Director Ahead of Biden’s Cybersecurity EO
The long-time NSA and cyber specialist says he’s exiting the public sector. This article has been indexed from Dark Reading Read the original article: Inglis Retires as National Cyber Director Ahead of Biden’s Cybersecurity EO
Not Stoked: Burton Snowboards’ Online Orders Disrupted After Cyberattack
The snow sports specialist is investigating to see what caused the operations-disrupting “cyber incident.” This article has been indexed from Dark Reading Read the original article: Not Stoked: Burton Snowboards’ Online Orders Disrupted After Cyberattack
Expel Tackles Cloud Threats With MDR for Kubernetes
The new managed detection and response platform simplifies cloud security for Kubernetes applications. This article has been indexed from Dark Reading Read the original article: Expel Tackles Cloud Threats With MDR for Kubernetes
Massive GoAnywhere RCE Exploit: Everything You Need to Know
Weeks after an exploit was first announced in a popular cloud-based file transfer service, could some organizations still be vulnerable? The answer is yes. This article has been indexed from Dark Reading Read the original article: Massive GoAnywhere RCE Exploit:…
Encrypted Traffic, Once Thought Safe, Now Responsible For Most Cyberthreats
It’s a classic attacker move: Use security protections against those who deploy them. But organizations can still defuse and prevent these encrypted attacks. This article has been indexed from Dark Reading Read the original article: Encrypted Traffic, Once Thought Safe,…
AppSec Threats Deserve Their Own Incident Response Plan
With a rearranging of priorities and good incident response plans, organizations can be ready to face the future of software attacks. This article has been indexed from Dark Reading Read the original article: AppSec Threats Deserve Their Own Incident Response…
SideWinder APT Spotted Targeting Crypto
The nation-state threat group has been attacking a wider range of victims and regions than previously thought. This article has been indexed from Dark Reading Read the original article: SideWinder APT Spotted Targeting Crypto
Atlassian: Leaked Data Stolen via Third-Party App
SiegedSec threat group leaked data that Atlassian says was taken from app used to coordinate in-office resources. This article has been indexed from Dark Reading Read the original article: Atlassian: Leaked Data Stolen via Third-Party App
ESXi Ransomware Update Outfoxes CISA Recovery Script
New ESXiArgs-ransomware attacks include a workaround for CISA’s decryptor, researchers find. This article has been indexed from Dark Reading Read the original article: ESXi Ransomware Update Outfoxes CISA Recovery Script
MVP Vibe Fest Bridges Gap Between Athletics and Cybersecurity
Top athletes compete both on and off the track in a mix of track and field events and cyber games. This article has been indexed from Dark Reading Read the original article: MVP Vibe Fest Bridges Gap Between Athletics and…
SASE Market to Exceed Over $60B Between 2022 and 2027, According to Dell’Oro Group
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: SASE Market to Exceed Over $60B Between 2022 and 2027, According…
Infrastructure Risks Increase As IT and OT Converge
Explosive growth of devices associated with the Internet of Things and operational technologies gives attackers a larger pool of targets. This article has been indexed from Dark Reading Read the original article: Infrastructure Risks Increase As IT and OT Converge
Cybersecurity Jobs Remain Secure Despite Recession Fears
Only 10% of corporate executives expect to lay off members of cybersecurity teams in 2023, much lower than other areas, as companies protect hard-to-find skill sets. This article has been indexed from Dark Reading Read the original article: Cybersecurity Jobs…
WatchGuard Launches New Line of Firewall Products to Enhance Unified Security for Remote and Distributed Businesses
Powered by WatchGuard’s Unified Security Platform® architecture, new Fireboxes deliver enhanced performance and added security capabilities that MSPs and IT admins can easily manage in WatchGuard Cloud. This article has been indexed from Dark Reading Read the original article: WatchGuard…
Window Snyder’s Startup Launches Security Platform for IoT Device Makers
Thistle’s technology will give device makers a way to easily integrate features for secure updates, memory management, and communications into their products, Snyder says. This article has been indexed from Dark Reading Read the original article: Window Snyder’s Startup Launches…
Window Snyder’s Start-up Launches Security Platform for IoT Device Makers
Thistle’s technology will give device makers a way to easily integrate features for secure updates, memory management, and communications into their products, Snyder says. This article has been indexed from Dark Reading Read the original article: Window Snyder’s Start-up Launches…
SideWinder APT Spotted Stealing Crypto
The nation-state threat group has been attacking a wider range of victims and regions than previously thought. This article has been indexed from Dark Reading Read the original article: SideWinder APT Spotted Stealing Crypto
Simplify to Survive: How Organizations Can Navigate Cyber-Risk
Simplification can result in efficiencies, reduced overhead, and the ability to respond to cyber threats more quickly. This article has been indexed from Dark Reading Read the original article: Simplify to Survive: How Organizations Can Navigate Cyber-Risk
Descope Handles Authentication So Developers Don’t Have To
Developers don’t have to build authentication and user management from scratch, and can devote their energies to the core functions of the application, instead. This article has been indexed from Dark Reading Read the original article: Descope Handles Authentication So…
Oligo Security Takes Aim at Open Source Vulnerabilities
The startup’s software helps organizations secure their containers in the cloud by teasing out which packages are running and which are vulnerable. This article has been indexed from Dark Reading Read the original article: Oligo Security Takes Aim at Open…
ChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally
Incident response triage and software vulnerability discovery are two areas where the large language model has demonstrated success, although false positives are common. This article has been indexed from Dark Reading Read the original article: ChatGPT Subs In as Security…
2023 Is the Year of Risk: 5 Ways to Prepare
2022 saw a record number of cyberattacks. In response, regulators are prescribing how companies should manage their risks. How do you prepare? This article has been indexed from Dark Reading Read the original article: 2023 Is the Year of Risk:…
Call for Speakers Now Open for the RH-ISAC Cyber Intelligence Summit
Retail & Hospitality ISAC invites industry leaders, experts, and innovators to submit proposals for presentations and panel discussions. This article has been indexed from Dark Reading Read the original article: Call for Speakers Now Open for the RH-ISAC Cyber Intelligence…
Brivo Reveals Top Security Trends for 2023: Convenience Is King in Securing the Hybrid Workplaces of the Future
Factoring user experience and convenience into how employees and tenants access buildings is top concern for security professionals says benchmark industry survey. This article has been indexed from Dark Reading Read the original article: Brivo Reveals Top Security Trends for…
GAO Calls for Improved Data Privacy Protections
US federal watchdog agency outlines key measures for better protecting sensitive data under the federal government’s control. This article has been indexed from Dark Reading Read the original article: GAO Calls for Improved Data Privacy Protections
3 Ways CISOs Can Lead Effectively and Avoid Burnout
Information security is a high-stakes field with sky-high expectations. Here’s how CISOs can offset the pressures and stay healthy. This article has been indexed from Dark Reading Read the original article: 3 Ways CISOs Can Lead Effectively and Avoid Burnout
What Purple Teams Wish Companies Knew
Here are some of the easily avoidable mistakes most companies made last year, gleaned from hundreds of cybersecurity engagements by red and blue teams. This article has been indexed from Dark Reading Read the original article: What Purple Teams Wish…
Build Cyber Resiliency With These Security Threat-Mitigation Considerations
CISOs need to define their risk tolerance, identify specific critical data, and make changes based on strategic business goals. This article has been indexed from Dark Reading Read the original article: Build Cyber Resiliency With These Security Threat-Mitigation Considerations
IGEL Unveils COSMOS, the Unified End User Computing Platform for Secure, Managed Access to Any Cloud Workspace
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: IGEL Unveils COSMOS, the Unified End User Computing Platform for Secure,…
Report Reveals Record-Breaking Year for Cyber Threats
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Report Reveals Record-Breaking Year for Cyber Threats
1898 & Co Launches New Cybersecurity Service for Critical Infrastructure
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: 1898 & Co Launches New Cybersecurity Service for Critical Infrastructure
5th State of CCPA, CPRA, and GDPR Compliance Report Shows More Than 90% of Companies Are Not Compliant
As CPRA went into effect on January 1, latest CYTRIO research says 91% of companies still uncompliant with GDPR; 92% not compliant with CCPA and CPRA. This article has been indexed from Dark Reading Read the original article: 5th State…
NIST’s New Crypto Standard a Step Forward in IoT Security
The National Institute of Standards and Technology has settled on a standard for encrypting Internet of Things (IoT) communications, but many devices remain vulnerable and unpatched. This article has been indexed from Dark Reading Read the original article: NIST’s New…
How Security Teams Can Protect Employees Beyond Corporate Walls
De-shaming security mistakes and taking the blame and punishment out of incident reporting can strengthen security efforts both inside and outside of the workplace. This article has been indexed from Dark Reading Read the original article: How Security Teams Can…
Russian Cybercriminal Faces Decades in Prison for Hacking and Trading Operation
Vladislav Klyushin and co-conspirators used SEC filings stolen from the networks of Tesla, Roku, and other publicly traded companies to earn nearly $100 million in illegal trades. This article has been indexed from Dark Reading Read the original article: Russian…
Expel Tackles Cloud Threats With MDR for Kubernetes
The new managed detection and response platform simplifies cloud security for Kubernetes applications. This article has been indexed from Dark Reading Read the original article: Expel Tackles Cloud Threats With MDR for Kubernetes
OT Network Security Myths Busted in a Pair of Hacks
How newly exposed security weaknesses in industrial wireless, cloud-based interfaces, and nested PLCs serve as a wake-up call for hardening the physical process control layer of the OT network. This article has been indexed from Dark Reading Read the original…
9 New Microsoft Bugs to Patch Now
78 new CVEs patched in this month’s batch — nearly half of which are remotely executable and three of which attackers already are exploiting. This article has been indexed from Dark Reading Read the original article: 9 New Microsoft Bugs…
Oakland City Services Struggle to Recover From Ransomware Attack
Fire emergency, 911 services functioning, along with Oakland financial systems, city says. This article has been indexed from Dark Reading Read the original article: Oakland City Services Struggle to Recover From Ransomware Attack
Configuration Issues in SaltStack IT Tool Put Enterprises at Risk
Researchers flag common misconfiguration errors and a template injection technique that could let an attacker take over the IT management network and connected systems. This article has been indexed from Dark Reading Read the original article: Configuration Issues in SaltStack…
Hospitals Sued for Using Meta’s Ad-Tracking Code, Violating HIPAA
Lawsuits say hospitals using Meta Pixel code violated patient privacy — sharing conditions, medications, and more with Facebook. This article has been indexed from Dark Reading Read the original article: Hospitals Sued for Using Meta’s Ad-Tracking Code, Violating HIPAA
Why SecDataOps Is the Future of Your Security Program
The goal: Ensure that data is always finely curated and accessible, and that security decisions get made with high-fidelity data. This article has been indexed from Dark Reading Read the original article: Why SecDataOps Is the Future of Your Security…
Vaultree Appoints Technology Industry Veteran Rinki Sethi to Its Board of Directors
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Vaultree Appoints Technology Industry Veteran Rinki Sethi to Its Board of…
Ping Identity and Deloitte Forge Alliance to Give Organizations Advanced Identity and Access Solutions
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Ping Identity and Deloitte Forge Alliance to Give Organizations Advanced Identity…
Cyber-Physical Systems Vulnerability Disclosures Reach Peak, While Disclosures by Internal Teams Increase 80% Over 18 Months
State of XIoT Security Report: 2H 2022 from Claroty’s Team82 reveals positive impact by researchers on strengthening XIoT security and increased investment among XIoT vendors in securing their products. This article has been indexed from Dark Reading Read the original…
SynSaber Launches a Free OT PCAP Analyzer Tool for the Industrial Security Community
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: SynSaber Launches a Free OT PCAP Analyzer Tool for the Industrial…
ThreatConnect Closes 2022 with Accelerated Growth in Threat Intelligence Operations (TI Ops)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: ThreatConnect Closes 2022 with Accelerated Growth in Threat Intelligence Operations (TI…
Lessons All Industries Can Learn From Automotive Security
Industry standards must evolve as digital transformation makes all companies software companies. Security testing boosts development speed and software quality. This article has been indexed from Dark Reading Read the original article: Lessons All Industries Can Learn From Automotive Security
Embattled VMware ESXi Hypervisor Flaw Exploitable in Myriad Ways
It’s not just Internet-accessible hosts that are vulnerable, researchers say. This article has been indexed from Dark Reading Read the original article: Embattled VMware ESXi Hypervisor Flaw Exploitable in Myriad Ways
Dark Web Revenue Down Dramatically After Hydra’s Demise
Competitor markets working to replace Hydra’s money-laundering services for cybercriminals. This article has been indexed from Dark Reading Read the original article: Dark Web Revenue Down Dramatically After Hydra’s Demise
9 Scammers Busted for 5M Euro Phishing Fraud Ring
The network is alleged to have operated 100 bank accounts and stolen millions from American people and companies. This article has been indexed from Dark Reading Read the original article: 9 Scammers Busted for 5M Euro Phishing Fraud Ring
Accenture Acquires Morphus, Brazil-Based Cybersecurity Company
Morphus’s deep cybersecurity research expertise, cyber defense and threat intelligence services widen Accenture’s cybersecurity footprint in Latin America. This article has been indexed from Dark Reading Read the original article: Accenture Acquires Morphus, Brazil-Based Cybersecurity Company
Healthcare in the Crosshairs of North Korean Cyber Operations
CISA, FBI, and South Korean intelligence agencies warn that the North Korean government is sponsoring ransomware attacks to fund its cyber-espionage activities. This article has been indexed from Dark Reading Read the original article: Healthcare in the Crosshairs of North…
Russian Hackers Disrupt NATO Earthquake Relief Operations
Killnet claims DDoS attack against NATO Special Operations Headquarters, Strategic Airlift Capability, and more. This article has been indexed from Dark Reading Read the original article: Russian Hackers Disrupt NATO Earthquake Relief Operations
What Happened to #OpRussia?
The cyberwar to attack Russia has never really stopped, despite a decreasing interest from the West. This article has been indexed from Dark Reading Read the original article: What Happened to #OpRussia?
Toyota Global Supply Chain Portal Flaw Put Hacker in the Driver’s Seat
The automaker closed a hole that allowed a security researcher to gain system administrator access to more than 14,000 corporate and partner accounts and troves of sensitive data. This article has been indexed from Dark Reading Read the original article:…
It Isn’t Time to Worry About Quantum Computing Just Yet
Don’t let something that’s a decade away distract you from today’s cyber threats. This article has been indexed from Dark Reading Read the original article: It Isn’t Time to Worry About Quantum Computing Just Yet
Reddit Hack Shows Limits of MFA, Strengths of Security Training
A tailored spear-phishing attack successfully convinced a Reddit employee to hand over their credentials and their one-time password, but soon after, the same worker notified security. This article has been indexed from Dark Reading Read the original article: Reddit Hack…
Why ChatGPT Isn’t a Death Sentence for Cyber Defenders
Generative AI combined with user awareness training creates a security alliance that can let organizations work protected from ChatGPT. This article has been indexed from Dark Reading Read the original article: Why ChatGPT Isn’t a Death Sentence for Cyber Defenders
Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits
The US Treasury Department linked the notorious cybercrime gang to Russian Intelligence Services because cyberattacks that disrupted hospitals and other critical infrastructure align with Russian state interests. This article has been indexed from Dark Reading Read the original article: Trickbot…
Why Some Cloud Services Vulnerabilities Are So Hard to Fix
Five months after AWS customers were alerted about three vulnerabilities, nearly none had plugged the holes. The reasons why underline a need for change. This article has been indexed from Dark Reading Read the original article: Why Some Cloud Services…
How to Optimize Your Cyber Insurance Coverage
From prevention and detection processes to how you handle policy information, having strong cyber insurance coverage can help mitigate cybersecurity attacks. This article has been indexed from Dark Reading Read the original article: How to Optimize Your Cyber Insurance Coverage
MagicWeb Mystery Highlights Nobelium Attacker’s Sophistication
The authentication bypass used by the Nobelium group, best known for the supply chain attack on SolarWinds, required a massive, real-time investigation to uncover, Microsoft says. This article has been indexed from Dark Reading Read the original article: MagicWeb Mystery…
Integreon Launches Cyber Incident Response Offering with Development of AI-Based Review and Integration of RadarFirst
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Integreon Launches Cyber Incident Response Offering with Development of AI-Based Review…
Attacker Allure: A Look at the Super Bowl’s Operational Cyber-Risks
Event organizers should be exercising various cyberattack scenarios to ensure they have the proper checks and balances in place to respond accordingly and maintain resilience. This article has been indexed from Dark Reading Read the original article: Attacker Allure: A…
Malicious Game Mods Target Dota 2 Game Users
Valve’s unpatched JavaScript engine and incomplete modification vetting process for Steam-delivered mods led to user systems being backdoored. This article has been indexed from Dark Reading Read the original article: Malicious Game Mods Target Dota 2 Game Users
Addressing the Elephant in the Room: Getting Developers & Security Teams to Work Together
Bridging the divide between developers and security can create a culture change organically. This article has been indexed from Dark Reading Read the original article: Addressing the Elephant in the Room: Getting Developers & Security Teams to Work Together
Google Cloud Connects Chronicle to Health ISAC Feed
Members of the Health-ISAC can ingest threat indicators directly into Chronicle to investigate whether the threat is present in their environment. This article has been indexed from Dark Reading Read the original article: Google Cloud Connects Chronicle to Health ISAC…
Reddit Breached With Stolen Employee Credentials
Reddit code, internal documents, dashboards, and business systems were compromised in the cyberattack. This article has been indexed from Dark Reading Read the original article: Reddit Breached With Stolen Employee Credentials
How Do Playbooks Help CISOs Improve SecOps?
Extended detection and response (XDR) solutions have evolved to offer automated tools, such as playbooks, that enhance context and response. This article has been indexed from Dark Reading Read the original article: How Do Playbooks Help CISOs Improve SecOps?
NewsPenguin Goes Phishing for Maritime & Military Secrets
A sophisticated cyber-espionage attack against high-value targets attending a maritime technology conference in Pakistan this weekend has been in the works since last year. This article has been indexed from Dark Reading Read the original article: NewsPenguin Goes Phishing for…
4 Ways to Handle AI Decision-Making in Cybersecurity
As evolving cyber threats force security teams to adopt AI to automate workflows, we ask how the relationship between humans and AI will pan out. This article has been indexed from Dark Reading Read the original article: 4 Ways to…
SynSaber Releases ICS CVE Retrospective: 3 Years of CISA Advisories
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: SynSaber Releases ICS CVE Retrospective: 3 Years of CISA Advisories
7 Critical Cloud Threats Facing the Enterprise in 2023
From shadow data to misconfigurations, and overpermissioning to multicloud sprawl, Dark Reading’s cloud security slideshow helps security pros understand the threat horizon. This article has been indexed from Dark Reading Read the original article: 7 Critical Cloud Threats Facing the…
Avast Threat Report: Consumers Plagued With Refund Fraud, Tech Support Scams, and Adware
Avast researchers also discovered and reported two zero-day vulnerabilities, and observed the spread of information-stealing malware, remote access trojans, and botnets. This article has been indexed from Dark Reading Read the original article: Avast Threat Report: Consumers Plagued With Refund…
Kaspersky Finds Growing Number of Parents Experiencing Ransomware Attacks on Children’s Schools
Schools paying higher ransoms and seeing longer closures, according to survey of parents. This article has been indexed from Dark Reading Read the original article: Kaspersky Finds Growing Number of Parents Experiencing Ransomware Attacks on Children’s Schools
Cryptographers Decode Secret Letters of Mary, Queen of Scots
Nearly a half-millennium after her execution, encrypted letters from the imprisoned royal offer a fascinating look into early cryptography. This article has been indexed from Dark Reading Read the original article: Cryptographers Decode Secret Letters of Mary, Queen of Scots
A Fool With a Tool Is Still a Fool: A Cyber Take
New tech often requires new thinking — but that’s harder to install. This article has been indexed from Dark Reading Read the original article: A Fool With a Tool Is Still a Fool: A Cyber Take
Phishing Surges Ahead, as ChatGPT & AI Loom
AI and phishing-as-a-service (PaaS) kits are making it easier for threat actors to create malicious email campaigns, which continue to target high-volume applications using popular brand names. This article has been indexed from Dark Reading Read the original article: Phishing…
In Perfect Harmony: Cybersecurity Regulation Harmonization
By simplifying compliance management, security and risk teams can focus on managing operational risk, not compliance risk — and better counter threats. This article has been indexed from Dark Reading Read the original article: In Perfect Harmony: Cybersecurity Regulation Harmonization
NIST Picks IoT Standard for Small Electronics Cybersecurity
NIST announces that it will use Ascon as a cryptography standard for lightweight IoT device protection. This article has been indexed from Dark Reading Read the original article: NIST Picks IoT Standard for Small Electronics Cybersecurity
Twitter Implements API Paywall, but Will That Solve Its Enormous Bot Crisis?
Restricting the Twitter API will have implications across Twitter, the broader Internet, and society, experts say. Is there a cybersecurity silver lining, or will threat actors pay to play? This article has been indexed from Dark Reading Read the original…
Twitter Implements API Paywall; But Will That Solve Its Enormous Bot Crisis?
Restricting the Twitter API will have implications across Twitter, the broader Internet, and society, experts say. Is there a cybersecurity silver lining, or will threat actors pay to play? This article has been indexed from Dark Reading Read the original…
Lessons From the Cold War: How Quality Trumps Quantity in Cybersecurity
High-quality tools and standards remain critical components in cybersecurity efforts even as budgets decline. It’s important that staff knows response procedures and their roles, and also communicates well. This article has been indexed from Dark Reading Read the original article:…
CISA Releases Recovery Script for Victims of ESXiArgs Ransomware
The malware has affected thousands of VMware ESXi hypervisors in the last few days. This article has been indexed from Dark Reading Read the original article: CISA Releases Recovery Script for Victims of ESXiArgs Ransomware
(ISC)² Makes Certified in Cybersecurity Exam Available in More Languages to Address Global Workforce Shortage
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: (ISC)² Makes Certified in Cybersecurity Exam Available in More Languages to…
Jailbreak Trick Breaks ChatGPT Content Safeguards
Jailbreak command creates ChatGPT alter ego DAN, willing to create content outside of its own content restriction controls. This article has been indexed from Dark Reading Read the original article: Jailbreak Trick Breaks ChatGPT Content Safeguards
Building Up IAM in a Multicloud World
In the cloud-first world, the security goal is to ensure only qualified users can access information across clouds. This article has been indexed from Dark Reading Read the original article: Building Up IAM in a Multicloud World
Exclu Shutdown Underscores Outsized Role Messaging Apps Play in Cybercrime
Apps like Telegram, WhatsApp, and Discord are a hotbed of cybercriminal communication and scams. This article has been indexed from Dark Reading Read the original article: Exclu Shutdown Underscores Outsized Role Messaging Apps Play in Cybercrime
Leading Energy Companies Tap Fortress to Build and Operate Industry Repository to Identify and Remediate Critical Software Vulnerabilities
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Leading Energy Companies Tap Fortress to Build and Operate Industry Repository…
ActZero Unveils Next-Generation MDR Platform
Latest release gives small and mid-sized enterprises AI-driven analysis tools and unified visibility across IT environments for stronger ransomware protection. This article has been indexed from Dark Reading Read the original article: ActZero Unveils Next-Generation MDR Platform
Skybox Security Appoints Cybersecurity Veteran Mordecai Rosen as CEO
Skybox closes $50 million in financing to drive growth of its SaaS-based security platform. This article has been indexed from Dark Reading Read the original article: Skybox Security Appoints Cybersecurity Veteran Mordecai Rosen as CEO
Gigamon Exits NDR Market, Sells ThreatInsight Business to Fortinet
Omdia has learned that Gigamon sold its ThreatInsight NDR business to Fortinet for approximately $31 million. The deal highlights what may be a pivot point for the NDR market. This article has been indexed from Dark Reading Read the original…
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting and Financial Data in Year Ahead
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Almost Half of Executives Expect a Rise in Cyber Events Targeting…
Corelight Expands Partnership With CrowdStrike to Provide Network Detection and Response Technology for CrowdStrike Services
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Dark Reading Read the original article: Corelight Expands Partnership With CrowdStrike to Provide Network Detection and Response…
GAO Calls for Action to Protect Cybersecurity of Critical Energy, Communications Networks
Enhanced industrial control systems cybersecurity for energy and communications sector among top recommendations in new GAO cybersecurity assessment. This article has been indexed from Dark Reading Read the original article: GAO Calls for Action to Protect Cybersecurity of Critical Energy,…
SecuriThings Brings Managed Service Capabilities to Physical Security, With New Managed Service Platform
Platform opens new opportunities for managed service providers to manage, visualize, and secure customer devices from a single pane of glass, including automated maintenance and other operations. This article has been indexed from Dark Reading Read the original article: SecuriThings…
Toyota Global Supply Chain Portal Flaw Put Hacker in the Driver’s Seat
The automaker closed a hole that allowed a security researcher to gain system administrator access to more than 14,000 corporate and partner accounts and troves of sensitive data. This article has been indexed from Dark Reading Read the original article:…
Gigamon Exits NDR Market, Sells ThreatINSIGHT Business to Fortinet
Omdia has learned that Gigamon sold its ThreatINSIGHT NDR business to Fortinet for approximately $31 million. The deal highlights what may be a pivot point for the NDR market. This article has been indexed from Dark Reading Read the original…