Skip to content

General

All discussions that don't fall under a specific category

3.7k Topics 3.7k Posts
  • How to See the Light Past a Dark Day

    1
    0 Votes
    1 Posts
    32 Views
    CerberusC

    The risk landscape is dynamic and evolving. Even after overcoming a crisis, another is always waiting to override your company’s operations.

    https://www.securitymagazine.com/articles/97095-how-to-see-the-light-past-a-dark-day

  • 0 Votes
    1 Posts
    41 Views
    CerberusC

    Security checkpoints at the Tallahassee International Airport will be bolstered by computed tomography (CT) scanners, which will enable Transportation Security Administration (TSA) officers to search luggage without opening bags.

    https://www.securitymagazine.com/articles/97091-tsa-installs-security-screening-at-tallahassee-airport

  • 0 Votes
    1 Posts
    44 Views
    CerberusC

    Coinbase’s Super Bowl LVI commercial brings light to QR code security.

    https://www.securitymagazine.com/articles/97088-coinbase-super-bowl-ad-and-security-risks-of-qr-codes

  • 0 Votes
    1 Posts
    37 Views
    CerberusC

    Laurie Doran, a former intelligence official and national security leader, has been named Director of the New Jersey Office of Homeland Security and Preparedness.

    https://www.securitymagazine.com/articles/97090-laurie-doran-named-director-of-new-jersey-homeland-security-and-preparedness

  • 0 Votes
    1 Posts
    38 Views
    CerberusC

    Data breaches hit 2,932 U.S. organizations in 2021, according to the 2021 Year End Report: Data Breach QuickView from Risk Based Security and Flashpoint. From the top targeted sectors to common attack vectors, examine the cybersecurity trends here.

    https://www.securitymagazine.com/articles/97089-us-data-breach-volume-increased-10-in-2021

  • 0 Votes
    1 Posts
    51 Views
    CerberusC

    Deepfakes are taking the cybersecurity field by storm, and the artificial intelligence (AI) technology needed to create them is only becoming more sophisticated. Here’s how to thwart the two types of deepfakes.

    https://www.securitymagazine.com/articles/97085-the-two-faces-of-deepfakes-cybersecurity-and-identity-fraud

  • 0 Votes
    1 Posts
    38 Views
    CerberusC

    This year, organizations need to focus on three priorities when addressing network device vulnerabilities.

    https://www.securitymagazine.com/articles/97087-three-network-security-principles-for-businesses-to-adopt-in-2022

  • 0 Votes
    1 Posts
    50 Views
    CerberusC

    The San Francisco 49ers were hit by BlackByte ransomware over the weekend.

    https://www.securitymagazine.com/articles/97081-san-francisco-49ers-hit-by-blackbyte-ransomware

  • 0 Votes
    1 Posts
    40 Views
    CerberusC

    Four mobile cybersecurity threats that businesses need to be on the lookout for in 2022.

    https://www.securitymagazine.com/articles/97084-four-mobile-cybersecurity-threats-to-watch-in-2022

  • 0 Votes
    1 Posts
    42 Views
    CerberusC

    Insider risk presents a threat to U.S. organizations during the Great Resignation, according to the 2022 Annual Data Exposure Report from Code42.

    https://www.securitymagazine.com/articles/97083-96-of-companies-struggle-to-protect-data-from-insider-risk

  • 0 Votes
    1 Posts
    31 Views
    CerberusC

    The Howard Bend Water Plant facility conducted a tabletop exercise, focused on incident information sharing procedures, and emergency response and recovery operations.

    https://www.securitymagazine.com/articles/97072-st-louis-conducts-tabletop-exercise-to-keep-water-supply-safe

  • 0 Votes
    1 Posts
    34 Views
    CerberusC

    Cybersecurity experts weigh in on the National Institute of Standards and Technology (NIST)'s updated guidelines for maintaining software supply chain security.

    https://www.securitymagazine.com/articles/97082-nist-updates-software-supply-chain-security-guidance

  • 0 Votes
    1 Posts
    34 Views
    CerberusC

    Preparing for an uptick in sports betting, Tachi Palace Casino Resort implemented a weapons detection system to maintain security in its locations.

    https://www.securitymagazine.com/articles/97080-weapon-detection-secures-tachi-palace-casino-resort

  • 0 Votes
    1 Posts
    44 Views
    CerberusC

    Blockchain can help cybersecurity professionals looking to secure mobile applications with its transparency, decentralization and the encryption it provides.

    https://www.securitymagazine.com/articles/97078-securing-mobile-applications-with-blockchain-technology

  • ISC West 2022 product preview

    1
    0 Votes
    1 Posts
    41 Views
    CerberusC

    Check out the latest products and solutions to be introduced at ISC West 2022, from artificial intelligence-based access control to traffic monitoring and audio threat detection.

    https://www.securitymagazine.com/articles/97077-isc-west-2022-product-preview

  • 0 Votes
    1 Posts
    40 Views
    CerberusC

    Learn about the 2022 Bill Zalud Memorial Award honorees.

    https://www.securitymagazine.com/articles/97079-garry-bergin-and-paul-kellett-receive-2022-bill-zalud-memorial-award

  • 0 Votes
    1 Posts
    47 Views
    CerberusC

    Four recommendations to improve software supply chain security.

    https://www.securitymagazine.com/articles/97074-4-guidelines-to-improve-national-supply-chain-security

  • 0 Votes
    1 Posts
    40 Views
    CerberusC

    This February, two of the biggest in the sports world will occur concurrently: the Winter Olympic Games and the Super Bowl. Cybercriminals could use a broad range of cyber activities to disrupt these events.

    https://www.securitymagazine.com/articles/96950-cybersecurity-risks-at-this-years-olympics-and-super-bowl

  • 0 Votes
    1 Posts
    40 Views
    CerberusC

    Former Baker Hughes and GE security exec Josh Walker has been named Vice President of Security at Bridgestone Americas.

    https://www.securitymagazine.com/articles/97075-josh-walker-named-vp-of-security-at-bridgestone-americas

  • 0 Votes
    1 Posts
    45 Views
    CerberusC

    The Cybersecurity and Infrastructure Security Agency (CISA) has added 15 new vulnerabilities to its Known Exploited Vulnerabilities Catalog.

    https://www.securitymagazine.com/articles/97071-cisa-adds-15-new-vulnerabilities-to-exploit-catalog