Security News > 2019

Managing Third-Party Risks: CISO Insights
2019-12-26 18:48

TMF Group's Devender Kumar on Effectively Handling Vendor RiskIt's important to look into the inherent risks of engaging with vendors before getting into assessing individual companies, says...

Managing Open Source Components
2019-12-26 18:18

BNP Paribas' Patrick Pitchappa on Application SecurityBecause open source components have known vulnerabilities, it's important for companies to invest in the right tools to help developers build...

Ingredients of an Incident Response Playbook
2019-12-26 17:18

Anish Ravindranathan of General Mills on How His Team Responds to AttacksBuilding a good incident response plan requires analytical skills, says Anish Ravindranathan, lead, cybersecurity detection...

Citrix Vulnerability Could Affect 80,000 Companies: Report
2019-12-26 16:18

Positive Technologies: Potential Risks Include DDoS, Phishing and Malware AttacksResearchers at Positive Technologies say they discovered a vulnerability in enterprise software offerings from...

Researchers: Chinese APT Espionage Campaign Bypasses 2FA
2019-12-26 16:18

Fox-IT Suspects APT20 Group Was InvolvedAn advanced persistent threat espionage campaign with suspected ties to the Chinese government quietly targeted businesses and governments in 10 countries...

Thai Officials Say Prison Cameras Were Hacked, Broadcast
2019-12-26 15:07

Authorities in Thailand say they are investigating an apparent online break-in by a computer hacker that allowed him to broadcast surveillance video from inside a prison in the country's south. read more

HIPAA Standard 164.312(d): MFA to the Rescue
2019-12-26 15:04

How Common is it for Individuals to Remember PINs or Passwords Set by Entities Holding the Information They're Requesting?Humans have enough things to remember as it is and remembering yet another...

Constant Vigilance Requires Looking Back as Well as Forward
2019-12-26 15:02

Security researchers continue to report that many of the primary threats to organizations today come from older attacks and exploits targeting vulnerable systems for which patches are readily...

Apple iCloud “data dump” extortionist avoids prison
2019-12-26 14:20

He claimed to have logins for millions of iCloud accounts, and told Apple he'd shut them all down unless he received a payoff.

Combining AI and Playbooks to Predict Cyberattacks
2019-12-26 14:00

Mature machine learning can analyze attack strategies and look for underlying patterns that the AI system can use to predict an attacker's next move.