Security News > 2020
Cybersecurity teams continue to struggle with hiring and retention, and very little improvement has been achieved in these areas since last year, according to ISACA. Understaffed and lacking diversity. ISACA's 2020 State of Cybersecurity survey report, unveiled at RSA Conference 2020, finds that enterprises are short-staffed, have difficulty identifying enough qualified talent and don't believe their HR teams adequately understand their hiring needs.
Cloud-based collaboration technologies and workforce turnover have become major drivers of data exfiltration as insider threat programs fail to keep pace with today's digital workplace, a Code42 survey reveals. Collaboration tools rated among top vectors for data exfiltration.
Security researchers and practitioners will be talking about a surge in SMS-based phishing attacks, the threat employees pose to data security, and how to improve health and wellness on security...
Less than half of organizations have a privileged access management strategy in place for digital transformation technologies, like RPA, according to a CyberArk report. Limiting access for reprogramming robots - Reduce the risk that comes with RPA permissions - like the ability to reprogram robots - by securely managing credentials to RPA tools and training RPA teams on secure software development practices.
Eliminate guesswork and get in-depth insights and practical recommendations for navigating the ever-changing cybercrime landscape. This data-laden, incident-rich report delivers insider information on the players, their motivations, tactics and targets so you can make informed security strategy decisions.
It's a lot to hold in one's mind, so to make your life easier, The Ultimate Security Pros' Checklist, created by Cynet, provides you with a concise and actionable checklist enabling you to keep track of all your operational, management and reporting tasks. You can think of the checklist templates as an aggregated crowd-sourcing from the numerous CISOs, security directors, architects, and SOC managers we have worked with across the years.
Building on a decade of significant investment in innovation, partnerships, acquisitions, customer research and open- source standards, Cisco is now offering customers the broadest, most integrated cloud-native security platform in the industry, Cisco SecureX. Cisco SecureX provides a comprehensive user experience across the breadth of Cisco's integrated security portfolio and customers' existing security infrastructure. Cisco SecureX unifies visibility, identifies unknown threats, and automates workflows to strengthen customers' security across network, endpoint, cloud, and applications.
Google yesterday released a new critical software update for its Chrome web browser for desktops that will be rolled out to Windows, Mac, and Linux users over the next few days. The latest Chrome 80.0.3987.122 includes security fixes for three new vulnerabilities, all of which have been marked 'HIGH' in severity, including one that has been reportedly exploited in the wild.
RSA CONFERENCE 2020 - San Francisco - Privacy compliance solutions provider SECURITI.ai has won the title of 'Most Innovative Startup' at the RSA Conference 2020 Innovation Sandbox contest that took place on Monday. The Innovation Sandbox competition allows pre-selected cybersecurity startup finalists to showcase their technologies to a panel of judges and attendees at the RSA Conference in hopes to win the highly coveted title.
By leveraging the power of the cloud-native CrowdStrike Falcon Platform and Threat Intelligence at the hands of CrowdStrike's highly-experienced Services team, Endpoint Recovery Services helps customers actively remediate ongoing security threats and rapidly recover from a potential incident while minimizing business interruptions. "Leveraging the power of the cloud, CrowdStrike is able to make incident recovery a quick, painless process for customers. With our innovative technology and leading group of security experts, Endpoint Recovery Services is geared to drastically reduce the average time-to-recovery, without interrupting business operations."