Week in review

Week in review: Vaporworms, DevOps roadmap for security, ethical data management
Here’s an overview of some of last week’s most interesting news and articles: Cybersecurity and ethical data management: Getting it right Laura Norén, director of …

Week in review: VirtualBox 0day, GPU side channel attacks, vulnerable self-encrypting SSDs
Here’s an overview of some of last week’s most interesting news and articles: Five key considerations when developing a Security Operations Center Organizations …

Week in review: Bleedingbit, nastiest malware of 2018, Cisco security appliances under attack
Here’s an overview of some of last week’s most interesting news and articles: New techniques expose your browsing history to attackers Security researchers at UC …

Week in review: Top cyber attack sources, serverless botnets, CFO as best cybersecurity friend
Here’s an overview of some of last week’s most interesting news and articles: Repairnator bot finds software bugs, successfully submits patches Can a bot create …

Week in review: Pentagon data breach, cybersecurity workforce gap, who gets spear phished?
Here’s an overview of some of last week’s most interesting news and articles: Who gets spear phished, and why? Spear phishing is one of the most successful methods …

Week in review: Enterprise cybersecurity PKIs, keeping your cloud malware-free
Here’s an overview of some of last week’s most interesting news and articles: Researchers link Industroyer to NotPetya ESET researchers believe they have found …

Week in review: Facebook data breach fallout, BEC-as-a-Service, true password behaviors
Here’s an overview of some of last week’s most interesting news and articles: APTs are targeting IT service providers Managed service providers (MSPs) and cloud …

Week in review: First-ever UEFI rootkit, Apple DEP vulnerability, new tactics subvert traditional security measures
Here’s an overview of some of last week’s most interesting news and articles: What do you mean by storage encryption? Depending on the threat context and how you …

Week in review: Shifting security priorities, phishing manipulation tactics, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Why identity verification needs to be a part of your digital transformation strategy …

Week in review: API security, malware-less email attacks, reversing the cybersecurity skills shortage
Here’s an overview of some of last week’s most interesting news and articles: What can we do to reverse the cybersecurity skills shortage? Having a strong pipeline …

Week in review: BA breach, Magento sites under attack
Here’s an overview of some of last week’s most interesting news and articles: How metrics can enhance the effectiveness of security programs Choosing the right …

Week in review: Blocking compromised passwords, removing personal data from connected cars
Here’s an overview of some of last week’s most interesting news and articles: 0patch releases micropatch for Windows Task Scheduler zero-day Acros Security, the …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility