Security News

Week in review: COVID-19-related threats, cybersecurity implications of working remotely
2020-03-22 10:50

Exploring the risky behavior of IT security professionalsAlmost 65% of the nearly 300 international cybersecurity professionals canvased by Gurucul at RSA Conference 2020 said they access documents that have nothing to do with their jobs. Increase web application security without causing any user disruptionIn this podcast recorded at RSA Conference 2020, Jason A. Hollander, CEO, and Paul B. Storm, President at Cymatic, talk about how their platform builds a defensible barrier around the user, so web-based threats can be stopped at the source.

HYAS Insight: A threat intelligence solution for investigation and attribution
2020-03-19 03:30

HYAS, a leader in threat intelligence and attribution, announced HYAS Insight, a threat intelligence and attribution solution that improves visibility and productivity for analysts, researchers and investigators while vastly increasing the accuracy of their findings. HYAS Insight lets analysts connect specific attack instances and campaigns to billions of historical and real-time indicators of compromise faster than ever before, bringing invaluable new intelligence and visibility to security efforts.

How to better defend your organization against remote access threats
2020-03-18 18:59

Released on Wednesday, Radware's report Coronavirus: Security Recommendations For Remote Access Threats explains how to safeguard your organization against remote access threats. VPNs. Remote workers rely on VPNs to gain secure access to an employer's network.

The Other Virus Threat: Surge in COVID-Themed Cyberattacks
2020-03-18 13:37

The abrupt move of millions of people to working remotely has sparked an unprecedented volume of attacks to trick people into giving up credentials to attackers, according to security researchers. The pandemic has created a perfect storm for cyberattacks, with millions of people working in unfamiliar, less secure circumstances and eager for information about the virus and new organizational policies being implemented.

How CISOs Should Prepare for Coronavirus Related Cybersecurity Threats
2020-03-18 10:04

Cybersecurity firm Cynet today revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors. In light of these insights, Cynet has also shared a few ways to best prepare for the Coronavirus derived threat landscape and provides a solution to protect employees that are working from home with their personal computers because of the Coronavirus.

How CISOs Should Prepare for Coronavirus Related Cybersecurity Threats
2020-03-18 10:04

Cybersecurity firm Cynet today revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors. In light of these insights, Cynet has also shared a few ways to best prepare for the Coronavirus derived threat landscape and provides a solution to protect employees that are working from home with their personal computers because of the Coronavirus.

How to protect your organization from security threats amidst the rise in telecommuters
2020-03-17 15:46

Handling internal security for an organization is tough enough, but when you must also deal with a soaring remote workforce, the security demands can become even more difficult. What are some of the security challenges involved with remote workers, and how can you ensure that your organization stays strong and protected against cyberthreats during this time? Here are the thoughts and recommendations of several security experts.

Playing the infinite game with threat intelligence and cyber fusion
2020-03-17 06:30

Security, unlike traditional sports, is not a finite game bound by a certain set of rules and a game clock. Given the inability of organizations to deal with the unknowns, security teams need to tilt the game in their favor by joining forces with other organizations in their sector, geography and implementing a strategy of simplifying and expanding intelligence sharing to gain greater visibility into the game before the attacker makes a move.

Auth0 Adds Threat Intelligence Tools to Identification Platform
2020-03-12 16:01

Identity management firm Auth0 has launched Auth0 Signals, a collection of threat intelligence tools and capabilities designed to protect customers from identity attacks. The purchased company's knowledge of malicious IP addresses provides an additional source of IP threat intelligence to Auth0's anomaly detection engine, which protects Auth0 customers.

Rising threats call for primary cyber resilience, new strategies for governments
2020-03-12 04:30

"Even with cyber insurance and preventive measures in place, the growing frequency and sophistication of attacks calls for government entities to perform cyber health checks and revisit resilience strategies. The effort more than pays off." Key considerations for organizations Smarter systems architecture - Many state and local governments have deferred IT modernization, which leaves governments with increasingly vulnerable networks and systems.