CISSP online self-paced training only $561 for a limited time
Is achieving the CISSP one of your 2020 goals? (ISC)² is here to help you stay on track to achieving your CISSP certification. For a limited time, get Official (ISC)² CISSP …
Week in review: API security basics, the future of infosec conferences, Sophos firewalls under attack
Here’s an overview of some of last week’s most interesting news, articles and podcasts: Is the future of information security and tech conferences virtual? While …
Growth of APIs for new services
This is the second of a series of articles that introduces and explains API security threats, challenges, and solutions for participants in software development, operations, …
Mitigating cybersecurity risks for employees working remotely
Many IT specialists are supporting fully remote teams for the first time ever, so it’s important for everyone to operate with the same caution (if not more) than they would if …
New infosec products of the week: May 1, 2020
Guardicore Infection Monkey now maps its actions to MITRE ATT&CK knowledge base The latest version of Guardicore Infection Monkey now maps its actions to the MITRE …
Surge in phishing attacks using legitimate reCAPTCHA walls
Cyber scammers are starting to use legitimate reCAPTCHA walls to disguise malicious content from email security systems, Barracuda Networks has observed. The reCAPTCHA walls …
What’s happening with all things cloud: Existing and future cloud strategies
Cloud spend exceeds budgets as organizations expect increased cloud use due to COVID-19, according to a Flexera report. “With employees working from home and more business …
Google announces cull of low-quality, misleading Chrome extensions
With Google Chrome being by far the most widely used web browser, Google must constantly tweak protections, rules and policies to keep malicious, unhelpful and otherwise …
How to thwart human-operated ransomware campaigns?
Most ransomware campaigns hitting healthcare organizations and critical services right now are just the final act of a months-long compromise. “Using an attack pattern …
As companies rely on digital revenue, the need for web and mobile app security skyrockets
As non-essential businesses have been forced to shut their doors around the world, many companies that previously relied heavily on the brick-and-mortar side of the business …
Keeping your app’s secrets secret
The software development process has vastly changed in this past decade. Thanks to the relentless efforts of the cloud and virtualization technology providers, we now have …
Suspicious business emails increase, imposters pretend to be executives
U.S. small businesses report an increase in suspicious business emails over the past year, a cyber survey by HSB shows, and employees are taking the bait as they fall for …
Featured news
Resources
Don't miss
- Deploying AI at the edge: The security trade-offs and how to manage them
- Cybercrime forums Cracked and Nulled seized, operators arrested
- SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs
- Zscaler CISO on balancing security and user convenience in hybrid work environments
- ExtensionHound: Open-source tool for Chrome extension DNS forensics