The role of the chief information security officer (CISO) is undergoing a tectonic shift. Advertise on IT Security News. Read the complete article: CISO Salaries 2020: Does a Changing Role Demand a Change in Pay?
How To Navigate An Uncertain Job Horizon
As published in the September/October edition of InfoSecurity Professional Magazine By Deborah Johnson Advice on how to mitigate a sudden job loss due to redundancy, recession or ‘rightsizing’. Diana Contesti was a business continuity planner at a major steel manufacturer…
The NDAA Pushes Forward on Cyber Metrics
The NDAA Pushes Forward on Cyber Metrics Advertise on IT Security News. Read the complete article: The NDAA Pushes Forward on Cyber Metrics
It’s Time for A Tough Conversation About Trust
By Gary Golomb, co-founder and chief scientist, Awake Security The lay reader may think computer and network security is mostly about controlling for malware, rogue code, exploits, ransomware, nation-state attacks, and the like. In reality, computer and network security are…
High Risk Vulnerabilities Addressed in Big Monitoring Fabric
Two high-severity vulnerabilities recently addressed in the Big Monitoring Fabric application could allow an attacker to remotely access affected systems. read more Advertise on IT Security News. Read the complete article: High Risk Vulnerabilities Addressed in Big Monitoring Fabric
TSMC Expected to Begin ‘A14’ 5nm Chip Production in Second Quarter
As expected, Apple chipmaker TSMC has secured orders for the “A14” processors to go in this year’s iPhones and is expected to start manufacturing the chips in the second quarter, according to industry sources cited in a DigiTimes report. The…
Sonos Criticised For Bricking Old Speakers
Recycle mode for a discount actually bricks expensive Sonos speakers, earning ire from owners over added ewaste being thrown away Advertise on IT Security News. Read the complete article: Sonos Criticised For Bricking Old Speakers
Nation-States, Ransomware Attacks, and Dark Web Activity: Our Top 5 Research Pieces From 2019
We remember some of the most important research projects conducted by Insikt Group in 2019 and give you an overview of their findings. The post Nation-States, Ransomware Attacks, and Dark Web Activity: Our Top 5 Research Pieces From 2019 appeared…
Survey Finds Cybersecurity Salaries Constrained
Despite a global shortage of cybersecurity expertise that is often described as nothing less than chronic, a global salary survey of 1,324 cybersecurity professionals finds nearly half the respondents (48%) earn less than $50,000 a year. Only 36% earn more…
Apple to Attend CES 2020 in Rare Official Appearance
Apple will make a rare official appearance at next week’s annual Consumer Electronics Show in Las Vegas where its HomeKit smart home system will take the limelight, reports Bloomberg‘s Mark Gurman. With Amazon and Google expected to roll out new…
Crooks use Star Wars saga as bait in Phishing and malware attacks
Crooks are exploiting the popularity of the Star Wars saga to monetize their efforts, experts warn of online streaming sites delivering malware. Cybercriminals leverage popular movies like Star Wars to lure users into downloading malware to watch exclusive scenes or the full…
Landry’s Notifies Customers of Payment Card Incident
Dining, hospitality and entertainment corporation Landry’s notified customers of a security incident that might have affected their payment card data. On December 31, Landry’s revealed that it first learned of the incident after it detected unauthorized activity on the payment…
US Soldiers Banned from Using TikTok
Security concerns mount over Chinese-owned app Advertise on IT Security News. Read the complete article: US Soldiers Banned from Using TikTok
Security Awareness Training Company KnowBe4 Enters 2020 with Record Growth
KnowBe4, the company that provides the world’s largest security awareness training and simulated phishing platform, today announced a massive year-over-year sales increase with another record-breaking quarter. In the fourth quarter of 2019, KnowBe4 reached 54% growth over Q4 2018, increasing…
Two tips to make multifactor authentication for Office 365 more effective
Multifactor authentication (MFA) is a key tool in ensuring that your Office 365 – and any online application – will be secure in the cloud. For those with Microsoft 365 here are some tips to ensure you provide maximum protection…
DigiTimes: Apple Could Launch Two ‘iPhone SE 2’ Models in 2020
Apple could launch a second version of the so-called iPhone SE 2 before the end of the year, according to DigiTimes. The latest prediction from the hit-and-miss industry publication is said to come from sources in Taiwan’s supply chain. The…
7 security incidents that cost CISOs their jobs
CISOs can leave their job for any number of reasons, but a breach or other security incident often hastens their departure. [ Find out what are the top cyber security certifications, who they’re for, what they cost, and which you…
Change your password: Poloniex cryptocurrency exchange reveals data leak
Password resets are being forced following a leak of account credentials. Advertise on IT Security News. Read the complete article: Change your password: Poloniex cryptocurrency exchange reveals data leak
Quick Hits
Quick Hits Advertise on IT Security News. Read the complete article: Quick Hits
Mitigating the risks of AI transparency in the next decade
Enterprises are placing their highest hopes on ML (machine learning). However ML, which sits at the heart of AI (artificial intelligence), is also starting to unnerve many enterprise legal and security professionals. One of the biggest concerns around AI is…
What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware
Comprehensive UEM solutions centrally support capabilities for data collection, reporting and alarming, data analysis, and automated response that are the hallmark of responsible endpoint security. The post What Is the Biggest Challenge Facing Endpoint Security? Hint: It’s Not Malware appeared…
Simple steps to protect yourself against identity theft
As we enter the New Year, be sure to keep up, or adopt, these good data security habits to avoid identity theft The post Simple steps to protect yourself against identity theft appeared first on WeLiveSecurity Advertise on IT…
FCW Insider: Jan. 2
The latest news and analysis from FCW’s reporters and editors. Advertise on IT Security News. Read the complete article: FCW Insider: Jan. 2
Microsoft Seizes Domains to Disrupt North Korean Hackers
Redmond claims Thallium group targeted US, Japanese and South Korean machines Advertise on IT Security News. Read the complete article: Microsoft Seizes Domains to Disrupt North Korean Hackers
Facebook Fined $1.65 Mn by Brazil
Brazil on Monday fined Facebook $1.65 million for improperly sharing users’ data in a case linked to the global Cambridge Analytica scandal. read more Advertise on IT Security News. Read the complete article: Facebook Fined $1.65 Mn by Brazil
Sextortion Email Scammers are Trying Out New Tactics to Circumnavigate Spam Filter
Sextortion scammers have started to utilize new tactics to bypass spam filters and secure email gateways so that their scam emails are delivered to their intended recipients. Sextortion scams are emails that pretend to be from an attacker who has…
Active Network, A School Software Vendor, Suffers Data Breach
Active Network’s Blue Bear Software platform reported that unauthorized activity in its network earlier this year resulted in customer PII being exposed. The company reported the issue to the California Attorney General’s office stating it recently became aware that between Oct. 1,…