Security News > 2020
Have you finalized your agenda for RSA Conference 2020? The security industry's seminal event is just around the corner and this year's theme is "Human Element". "1. Humans will always be essential to security. For years, we've layered defenses so that if one fails, another layer is there to stop the attack; we've searched for the next"silver bullet' security technology to solve all our cybersecurity challenges; and, we've subscribed to more and more threat feeds to improve security posture.
Hackers have posted on an underground forum the personal information of 10.6 million MGM Resorts guests, ZDNet reports. On Thursday, a MGM Resorts spokesperson confirmed to Information Security Media Group that the company was hit by a data breach in the summer of 2019, when attackers accessed a "Cloud server" that contained some details about guests who had visited the company's hotels and resorts.
New security tool from Bastille Networks can help security teams enforce no cell-phone zones. A new wireless detection platform from Bastille Networks allows companies to locate security threats from managed as well as rogue wireless, IoT, and cellular devices.
Learn how to prevent Linux users from executing certain commands and confining them to their home directory by employing rbash. We want to create the user such that their shell is rbash.
Avast Security for Mac is a solid choice and has been for a long time. Sophos Home Free for macOS. Sophos offers a great option for small businesses wanting to keep their networks clean: It can filter web content on up to three macOS or Windows devices for free.
Learn how to prevent Linux users from executing certain commands and confining them to their home directory by employing rbash.
The cybercrime ring is unique in its leveraging of Google's cloud-based productivity suite, G Suite, and for its use of physical checks for collecting fraudulent payments - as opposed to wire transfers. "For Exaggerated Lion, their use of physical checks as a cashout mechanism sets them apart from other BEC groups and their evolution to creating fake documents that are commonly used in authentic business transactions to add legitimacy to their scams."
Microsoft this week announced the general availability of Microsoft Threat Protection, its integrated security solution aimed at offering protection across users, email, applications, and endpoints. Microsoft Threat Protection leverages AI and automation to not only alert on discovered issues, but also allow responders to easily take action.
ProcessUnity, a leading provider of cloud-based applications for risk and compliance management, today announced a new pre-built configuration of its award-winning Vendor Risk Management solution. Best Practices Configuration for ProcessUnity Vendor Risk Management is a pre-configured Third-Party Risk Management program with turn-key workflows, assessments, calculations, risk analysis and reporting, allowing small to midsize organizations to successfully launch and maintain a third-party risk program from day one.
DMARC can prevent spammers from using a trusted domain name to send junk mail, a useful tactic for the presidential campaigns and for your organization, according to security provider Valimail.