Security News

How to Make Your Employees Your First Line of Cyber Defense
2024-05-01 11:03

There’s a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, you’ve got to remain prepared to confront those very same...

Are VPNs Legal To Use?
2024-05-01 11:01

VPNs are legal to use in most countries, including the United States, United Kingdom, Canada, some European Union countries, Australia and Japan. So while VPNs provide privacy and security, they don't exempt users from legal responsibilities.

ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan
2024-05-01 10:27

The authors behind the resurfaced ZLoader malware have added a feature that was originally present in the Zeus banking trojan that it's based on, indicating that it's being actively developed....

Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia
2024-05-01 06:32

A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years (262 months) in prison for attempting to transfer classified documents to Russia. "This sentence...

Why cloud vulnerabilities need CVEs
2024-05-01 05:00

Patch network security isn't applicable in the same way for cloud environments, and few cloud providers assign Common Vulnerabilities and Exposures identifiers to vulnerabilities. For vulnerability management teams who talk exclusively in this CVE-based construct, the lack of CVEs in cloud services is a significant challenge.

Making cybersecurity more appealing to women, closing the skills gap
2024-05-01 04:30

Although more women are entering the field of cyber security today, they still face challenges in obtaining senior positions, highlighting the need to break the glass ceiling. This could discourage women from pursuing a career in cyber security, and change is unlikely until more women hold influential senior positions.

Cybersecurity jobs available right now: May 1, 2024
2024-05-01 04:00

As a Cyber Security Analyst, you will monitor and analyze security events and alerts, perform triage of incoming alerts - assess the priority, determine risk, and respond, create tickets and escalate them to higher-level security analysts and developers. As the Expert, IT Security, you will ensure the availability of up-to-date expert knowledge on risk and security tools, procedures, and systems while driving enhancements to our IT security architecture.

Building a strong cloud security posture
2024-05-01 03:30

In this Help Net Security video, David Kellerman, Field CTO at Cymulate, discusses how cloud security still seems to lag even as the cloud grows in popularity and usage. Many leaders are unaware that they need to secure the cloud the same way they would on-prem infrastructure and that the responsibility falls to them, not cloud providers, to do the work.

Essential steps for zero-trust strategy implementation
2024-05-01 03:00

A fourth quarter 2023 Gartner survey of 303 security leaders whose organizations had already implemented or are planning to implement a zero-trust strategy found that 56% of organizations are primarily pursuing a zero-trust strategy because it's cited as an industry best practice. "For most organizations, a zero-trust strategy typically addresses half or less of an organization's environment and mitigates one-quarter or less of overall enterprise risk."

Infosec products of the month: April 2024
2024-05-01 02:00

CyberSense 8.6 ushers in a more proactive approach to ensuring data integrity against insider threats and external bad actors with a variety of customizable data threshold alerts. Bitdefender has enhanced Bitdefender Digital Identity Protection, a service that monitors personal data in real-time by proactively scanning the internet including public sites, dark web, and underground forums for unauthorized leaks and data breaches that may put user accounts and identity at risk.