Skip to content

General

All discussions that don't fall under a specific category

3.7k Topics 3.7k Posts
  • 0 Votes
    1 Posts
    48 Views
    CerberusC

    The recent pandemic accelerated a trend towards remote work that has been ongoing for years and, as a result, accelerated usage of cloud-based collaboration platforms and their impact on the field of digital forensics. This article will discuss the trends and challenges associated with these platforms as they pertain to cloud-based data collection and its use in forensic investigations.

    https://www.securitymagazine.com/articles/96320-cloud-based-computing-data-collection-and-forensic-investigation-challenges

  • 0 Votes
    1 Posts
    58 Views
    CerberusC

    We spend a lot of time and effort so we can spot attackers — and for a good reason! But without visibility into our own organizations, we’re left with too much uncertainty. So how can you use more visibility to counter the fog of war?

    https://www.securitymagazine.com/articles/96319-countering-the-fog-of-war-in-cybersecurity

  • 0 Votes
    1 Posts
    56 Views
    CerberusC

    CISA, the Federal Bureau of Investigation, the Environmental Protection Agency, and the National Security Agency have released a joint Cybersecurity Advisory that details ongoing cyber threats to U.S. Water and Wastewater Systems  Sector.

    https://www.securitymagazine.com/articles/96311-cisa-warns-of-ongoing-cyber-threats-to-us-water-and-wastewater-systems-sector-facilities

  • 0 Votes
    1 Posts
    53 Views
    CerberusC

    The Identity Theft Resource Center’s data breach analysis for the third quarter of 2021 has been released, highlighting an uptick in breaches compared to the first half of the year. The U.S. is set to break its own record for most data breaches in a year in 2021.

    https://www.securitymagazine.com/articles/96318-us-expected-to-break-data-breach-record-in-2021

  • 0 Votes
    1 Posts
    46 Views
    CerberusC

    A hybrid security solution of IP and analog surveillance cameras helps to keep the Dragon Liquid Natural Gas facility in Wales, U.K. secure.

    https://www.securitymagazine.com/articles/96316-ip-and-analog-surveillance-cameras-secure-welsh-natural-gas-facility

  • 0 Votes
    1 Posts
    51 Views
    CerberusC

    A recent surge in cyberattacks, including SolarWinds and Colonial Pipeline, has intensified a focus on cybersecurity across industrial sectors and critical infrastructure. As a result, the U.S. government and other organizations within the nation’s defense supply chain have taken action to protect the critical assets and organizations that ensure the security and prosperity of our country.

    https://www.securitymagazine.com/articles/96315-shoring-up-cybersecurity-in-critical-infrastructure-and-the-nations-defense-supply-chain

  • 0 Votes
    1 Posts
    59 Views
    CerberusC

    Two school district technology leaders share their first-hand experiences and insights into the cybersecurity vulnerabilities affecting the K-12 sector, along with how to design a security roadmap and the challenges that come along with implementing one.

    https://www.securitymagazine.com/articles/96313-cybersecurity-lessons-learned-in-the-k-12-sector

  • 0 Votes
    1 Posts
    49 Views
    CerberusC

    In emergencies such as a natural disaster, industrial accident, IT service disruptions or facility intrusion, delivering important messages with real-time speed while collecting situational feedback can save lives and keep critical business operations running. Enter mass notification technology. Here, we explore a sampling of the latest mass notification solutions.

    https://www.securitymagazine.com/articles/96312-connects-people-devices-and-organizations

  • 0 Votes
    1 Posts
    64 Views
    CerberusC

    With all the security strategies, architectures, automation tools and activities present, it can be mind-boggling to distinguish one from the other. Like many other security processes, penetration testing and threat hunting are often incorrectly equated. However, the difference between the two is that between prevention and detection.

    https://www.securitymagazine.com/articles/96314-pen-testing-vs-threat-hunting-whats-the-difference

  • 0 Votes
    1 Posts
    62 Views
    CerberusC

    In this installment of the Cybersecurity and Geopolitical Podcast, Ian Thornton-Trump (CISO at Cyjax) and Tristan de Souza retrospectively look at the inaugural International Cyber Expo in London, discussing data breaches, the role of a CISO and more.

    https://www.securitymagazine.com/articles/96303-the-cybersecurity-and-geopolitical-podcast-morality-and-cyber-risk-role-of-a-ciso-and-governmental-anti-cybercrime-episode-7

  • 0 Votes
    1 Posts
    52 Views
    CerberusC

    A new report from Veriff analyzes data about the cybersecurity workforce, finding strong cybersecurity industries in the United States, Brazil and Mexico. The report also details which jobs are the most in-demand, having researched global job boards and roles at cybersecurity companies.

    https://www.securitymagazine.com/articles/96310-software-engineers-and-developers-among-most-in-demand-cybersecurity-roles

  • 0 Votes
    1 Posts
    81 Views
    CerberusC

    More than 50% of organizations are considering a passwordless authentication strategy, according to the 2021 Duo Trusted Access Report. The study, released by Cisco’s Duo Security, measured authentication trends across more than 36 million devices.

    https://www.securitymagazine.com/articles/96309-biometric-authentication-sees-increase-in-adoption-during-the-pandemic

  • 0 Votes
    1 Posts
    82 Views
    CerberusC

    At the Raines Cybersecurity Leadership webinar, cyber expert Elad Yoran discussed the essential traits of a CISO and why businesses should incorporate a security voice in their boardroom.

    https://www.securitymagazine.com/articles/96308-the-critical-role-of-a-ciso-means-advocating-for-cybersecurity

  • 0 Votes
    1 Posts
    78 Views
    CerberusC

    HP Wolf Security threat research team sees cybercriminals using legitimate cloud providers to host malware, and switching up file and script types to evade detection tools.

    https://www.securitymagazine.com/articles/96307-attackers-exploiting-zero-day-vulnerability-before-enterprises-can-patch

  • 0 Votes
    1 Posts
    93 Views
    CerberusC

    School budgets have been set for the 2021/2022 school year, policies and procedures have been updated, staffing levels have been established, and security solutions have been deployed into this dynamic environment. Here, we consider adjustments that can be made to deployed controls so that children and school staff remain safe in both hybrid and remote learning environments.

    https://www.securitymagazine.com/articles/96305-protecting-schools-in-hybrid-and-remote-learning-environments

  • 0 Votes
    1 Posts
    71 Views
    CerberusC

    Throughout the past two years, supply chain professionals have experienced the national and international disruptions that can occur as a result of cyberattacks, with some threats completely halting certain sectors.

    https://www.securitymagazine.com/articles/96304-supply-chain-cybersecurity-trends-what-professionals-should-be-aware-of-and-how-to-prepare-for-2022

  • 0 Votes
    1 Posts
    73 Views
    CerberusC

    A new study from BioCatch, the “2021 Fraud Transformation Survey: Detecting and Preventing Emerging Schemes,” asked security leaders at global financial institutions about their perceptions of fraud and risk management.

    https://www.securitymagazine.com/articles/96302-account-takeover-named-top-fraud-threat

  • 0 Votes
    1 Posts
    62 Views
    CerberusC

    The Dallas Police Department, which is the ninth largest municipal police force, utilizes a layered approach to physical security at its headquarters building, including recently-installed perimeter security.

    https://www.securitymagazine.com/articles/96301-dallas-police-department-installs-perimeter-security-tech

  • Bill Shields named CISO at TransUnion

    1
    0 Votes
    1 Posts
    91 Views
    CerberusC

    Bill Shields brings over a decade of information security leadership experience to his Chief Information Security Officer (CISO) at TransUnion.

    https://www.securitymagazine.com/articles/96300-bill-shields-named-ciso-at-transunion

  • 0 Votes
    1 Posts
    69 Views
    CerberusC

    Randori released a report that identifies the most tempting internet-exposed assets that an attacker is likely to go after.

    https://www.securitymagazine.com/articles/96297-1-15-enterprises-still-vulnerable-to-solarwinds