Tag: Cybersecurity Insiders

Predictions for 2023 API Security

Richard Bird, Chief Security Officer, Traceable AI This year will be the year that many business and security leaders will wake up to truly understand the scope of their API security issues. For the past three years, organizations have prioritized…

Axiad Kicks Off 2023 with CyberSecured and TMC Cybersecurity Excellence Awards

SANTA CLARA, Calif.–(BUSINESS WIRE)–Axiad, a leading provider of organization-wide passwordless orchestration, has earned accolades from two prestigious industry awards programs, winning CyberSecured and Cybersecurity Excellence Awards for Axiad Cloud. The industry-leading Axiad Cloud platform delivers a holistic, consistent and secure…

Ransomware being spread through Fortinet VPN Devices

A Canadian college and a global investment firm’s computer network were compromised with ransomware after hackers broke into the virtual private network of Fortinet devices. The incident was discovered by the security researchers from eSentire in October 2022. But for…

Redspin, a Division of Clearwater, Announces Its Client Aero-Glen International Has Passed the First Voluntary Assessment Related to the CMMC Initiative

AUSTIN, Texas–(BUSINESS WIRE)–Redspin, a Division Clearwater and the first organization authorized as a Cybersecurity Maturity Model Certification (CMMC) Third-Party Assessment Organization (C3PAO), announced today that its client, Aero-Glen International, LLC, passed its Joint Surveillance Voluntary Assessment Program (JSVAP) assessment. The…

2023 Cybersecurity predictions

Cybersecurity is a relatively new discipline in the realm of computing. Once computing became more democratized with PCs connected via local area networks (LAN) and client/server environments, adversaries quickly saw opportunities. The more democratized computing – the more risk and…

Versa Networks Achieves FIPS 140-2 Security Certification

SANTA CLARA, Calif.–(BUSINESS WIRE)–Versa Networks, the recognized leader of single-vendor Secure Access Service Edge (SASE), today announced it has achieved FIPS 140-2 certification for its Versa Operating System (VOS)™, which is the foundation for Versa SASE and Versa Secure SD-WAN…

Latest Cyberthreats and Advisories – December 23, 2022

Ransomware hits hard around the world – again, Cybercriminals steal food and Fortnite’s developer is fined millions. Here are the latest threats and advisories for the week of December 23, 2022.  Threat Advisories and Alerts  Criminal Actors Use BEC Attacks…

The dos and don’ts of ransomware negotiations

The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Has your organization suddenly been attacked by a…

What is YTQ?

What is CRQC? Widespread interest in quantum computing continues to expand as computer innovators, scientists, and technology industry leaders vie to position themselves at the top of the pack for quantum computing prowess.  As the buzz continues, I’d like to…

Volvo car data on sale after ransomware attack

Volvo, the Swedish carmaker, has hit the Google headlines for an alleged data leak caused by a ransomware incident. The luxury car maker is yet to disclose whether the hack is true and if the leaked information genuinely belongs to…

HARMAN Introduces DefenSight Cybersecurity Platform at CES 2023

CES 2023, LAS VEGAS–(BUSINESS WIRE)–HARMAN, a wholly-owned subsidiary of Samsung Electronics Co., Ltd. focused on connected technologies and solutions for automotive, consumer and enterprise markets, today announced that its Digital Transformation Solutions (DTS) business unit is introducing DefenSight Cybersecurity Platform…

What is SASE

Secured Access Service Edge (SASE) is an evolving cloud-focused architecture that was released by Gartner in 2019. SASE is designed to solve the problem of network performance and limited security visibility for distributed corporate business systems (infrastructure, platforms, and applications)…

Ransomware attack on Wabtec leads to a data breach

Wabtec, a locomotive company offering transportation solutions to improve the world, has disclosed that its servers were hit by a malware last year, leaking sensitive details of its employees to hackers. The company that employs around 25,000 people and has…

Seasons Greetings from (ISC)2

Dear (ISC)² Members, Associates and Candidates:  I hope this message finds you well. As 2022 comes to an end, I am grateful for the opportunity to reflect on the past year and all we have achieved together.   Launching an entry-level certification…

Three cybercrime technology trends to watch in 2023

By Brad Liggett, Technical Director, Americas for Cybersixgill Technology’s rapid and relentless progress promises to continue apace in 2023, to everyone’s benefit – including cybercriminals’. The year promises a “Spy vs. Spy”-type cyberspace race as both criminals and defenders vie…

The Price Tag for Secure Systems is Way Too High

By Motti Elloul, VP Customer Success and Incident Response, Perception Point Enterprise security teams are spending astonishing amounts of time and money remediating cybersecurity incidents. A successful email-based cyber-attack can take security staff an average of 86 hours to address,…

Fidelis Cybersecurity Platforms Added to the DoD ESI Portfolio

BETHESDA, Md.–(BUSINESS WIRE)–Fidelis Cybersecurity, a portfolio company of Skyview Capital, today announced its platforms have been added to the Department of Defense (DoD) Enterprise Software Initiative (ESI) program as part of Carahsoft Technology Corp.’s most recent award. This will make…

Adobe accepts AI generated artwork

Adobe, the business owner of PhotoShop, has made it official that it will start accepting AI generated artwork on its Stock Photo platform, provided users follow its revised policies. Therefore, users can submit their finished artwork generated by the technology…

Google to pay compensation for Location Tracking

When the next time you give your smart phone’s location tracking control to Google, please be aware that the internet juggernaut can use it to create a virtual user profile and target ads onto your device. Maps, YouTube search history,…

Latest Cyberthreats and Advisories – December 16, 2022

The rise of new ransomware gangs, cyberattacks on Uber and California’s Department of Finance make headlines this week. Here are the latest threats and advisories for the week of December 16, 2022. Threat Advisories and Alerts U.K. Government Sets New…

Ransomware news trending on Google

A mining firm shut down its operations in Southern British Columbia in order to contain the repercussions developed from a ransomware attack. The Canadian Copper Mountain Mining Corporation is the firm that had to shut down its offices in Vancouver…

2022 (ISC)² Member Bloggers

The success of our membership-driven organization is closely linked to the effort that each certification holder puts into the organization. At (ISC)², we are fortunate to have a highly engaged membership that actively contributes to our success through volunteer opportunities.…