Skip to content
  • 0 Votes
    1 Posts
    14 Views
    CerberusC

    For a modern digital enterprise, the ubiquity, vulnerability and obscurity of APIs creates a perfect storm when it comes to application security.

    https://www.securitymagazine.com/articles/99433-four-testing-priorities-for-stronger-api-security

  • 0 Votes
    1 Posts
    10 Views
    CerberusC

    Although quantum computing can lead to positive and transformative solutions, the development also poses a significant threat to cybersecurity.

    https://www.securitymagazine.com/articles/99434-what-cisos-need-to-know-to-mitigate-quantum-computing-risks

  • 0 Votes
    1 Posts
    11 Views
    CerberusC

    The President discussed ongoing national efforts to prepare for extreme weather events and plans to improve storm response and resilience.

    https://www.securitymagazine.com/articles/99431-white-house-makes-summer-storm-plans

  • 0 Votes
    1 Posts
    12 Views
    CerberusC

    The Transportation Security Administration in Maryland will now accept Maryland mobile-driver’s licenses from Google Wallet at security checkpoints.

    https://www.securitymagazine.com/articles/99429-maryland-tsa-rolls-out-mobile-id-security-checks-for-android-users

  • 0 Votes
    1 Posts
    7 Views
    CerberusC

    ANZ announced Maria Milosavljevic has been appointed CISO, replacing Lynwen Connick, who will retire in October after six years as ANZ’s CISO.

    https://www.securitymagazine.com/articles/99428-maria-milosavljevic-named-next-ciso-at-anz

  • 0 Votes
    1 Posts
    10 Views
    CerberusC

    Under the proposed FTC order, Ring is prohibited from profiting from unlawfully accessing consumers videos and must pay $5.8 million in consumer refunds.

    https://www.securitymagazine.com/articles/99427-ftc-ring-failed-to-stop-hackers-from-accessing-users-cameras

  • 0 Votes
    1 Posts
    10 Views
    CerberusC

    Pharmaceutical fraud targeting patients and organizations was targeted in a recent report by BrandShield and the Pharmaceutical Security Institute.

    https://www.securitymagazine.com/articles/99425-7-500-fraudulent-pharmaceutical-listings-were-taken-down-in-2022

  • 0 Votes
    1 Posts
    8 Views
    CerberusC

    With cybersecurity threats on the rise, there are two crucial steps an organization can take to avoid falling victim to a credential phishing attack.

    https://www.securitymagazine.com/articles/99423-how-organizations-can-protect-against-phishing-campaigns

  • 0 Votes
    1 Posts
    7 Views
    CerberusC

    Nowis the time to secure non-human identities — access tokens, integrations and authentication tools — to prevent future cyberattacks.

    https://www.securitymagazine.com/articles/99303-non-human-identities-secure-them-now-not-later

  • 0 Votes
    1 Posts
    12 Views
    CerberusC

    Security executives who combine security culture, compliance and risk assessments can reduce the impact of security threats to enterprise supply chains.

    https://www.securitymagazine.com/articles/99416-managing-third-party-risks-in-the-supply-chain

  • 0 Votes
    1 Posts
    9 Views
    CerberusC

    Education technology provider Edmodo received an order from the FTC for collecting children’s personal data without proper parental consent.

    https://www.securitymagazine.com/articles/99422-ftc-orders-edmodo-to-stop-using-minor-education-data-for-advertising

  • 0 Votes
    1 Posts
    10 Views
    CerberusC

    According to a recent artificial intelligence (AI) and technology report, consumers appear to overestimate their ability to spot deepfakes.

    https://www.securitymagazine.com/articles/99421-52-of-consumers-confident-in-detecting-deepfake-videos

  • 0 Votes
    1 Posts
    10 Views
    CerberusC

    The FTA has proposed updates to the National Public Safety Plan to create a blueprint for transit agencies to adopt stronger safety measures.

    https://www.securitymagazine.com/articles/99420-federal-transit-administration-proposes-changes-to-safety-plan

  • 0 Votes
    1 Posts
    12 Views
    CerberusC

    In this AMA episode from Security magazine, Todd Jones, Director of Campus Safety at the Minneapolis College of Art and Design, talks campus security.

    https://www.securitymagazine.com/articles/99417-ama-campus-safety-leader-edition-todd-jones

  • 0 Votes
    1 Posts
    8 Views
    CerberusC

    As a constantly evolving form of malware, ransomware attacks only grow in sophistication and find new ways to steal business-critical data.

    https://www.securitymagazine.com/articles/99419-how-security-teams-should-respond-to-sophisticated-ransomware-attacks

  • 0 Votes
    1 Posts
    10 Views
    CerberusC

    Rather than debating the ways that the cloud is or isn’t inherently secure, leaders should question whether they are using the cloud securely.

    https://www.securitymagazine.com/articles/99397-the-5-pillars-of-cloud-security-for-data-storage

  • 0 Votes
    1 Posts
    9 Views
    CerberusC

    From the disruption of fuel distribution to the interruption of emergency healthcare services, cyberattacks are no longer confined to cyberspace.

    https://www.securitymagazine.com/articles/99415-technology-integration-exposes-infrastructure-to-cyberattacks

  • 0 Votes
    1 Posts
    12 Views
    CerberusC

    Organizations must ensure only the right people have access to the right data and that malicious actors don’t gain access to sensitive information.

    https://www.securitymagazine.com/articles/99414-89-of-businesses-report-concern-over-new-privacy-regulations

  • 0 Votes
    1 Posts
    11 Views
    CerberusC

    The Atlantic hurricane season starts on June 1, meaning security leaders need to prepare for potential severe weather with a disaster response plan.

    https://www.securitymagazine.com/articles/99413-prepare-for-severe-weather-ahead-of-hurricane-season

  • 0 Votes
    1 Posts
    9 Views
    CerberusC

    Using standard “enter your username and password” login credentials for any cloud-based resources is a security nightmare for IT teams.

    https://www.securitymagazine.com/blogs/14-security-blog/post/99401-the-growing-multifactor-authentication-imperative