Security News
Cybersecurity firm Cynet today revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors. In light of these insights, Cynet has also shared a few ways to best prepare for the Coronavirus derived threat landscape and provides a solution to protect employees that are working from home with their personal computers because of the Coronavirus.
Cybersecurity firm Cynet today revealed new data, showing that the Coronavirus now has a significant impact on information security and that the crisis is actively exploited by threat actors. In light of these insights, Cynet has also shared a few ways to best prepare for the Coronavirus derived threat landscape and provides a solution to protect employees that are working from home with their personal computers because of the Coronavirus.
Handling internal security for an organization is tough enough, but when you must also deal with a soaring remote workforce, the security demands can become even more difficult. What are some of the security challenges involved with remote workers, and how can you ensure that your organization stays strong and protected against cyberthreats during this time? Here are the thoughts and recommendations of several security experts.
Security, unlike traditional sports, is not a finite game bound by a certain set of rules and a game clock. Given the inability of organizations to deal with the unknowns, security teams need to tilt the game in their favor by joining forces with other organizations in their sector, geography and implementing a strategy of simplifying and expanding intelligence sharing to gain greater visibility into the game before the attacker makes a move.
Identity management firm Auth0 has launched Auth0 Signals, a collection of threat intelligence tools and capabilities designed to protect customers from identity attacks. The purchased company's knowledge of malicious IP addresses provides an additional source of IP threat intelligence to Auth0's anomaly detection engine, which protects Auth0 customers.
"Even with cyber insurance and preventive measures in place, the growing frequency and sophistication of attacks calls for government entities to perform cyber health checks and revisit resilience strategies. The effort more than pays off." Key considerations for organizations Smarter systems architecture - Many state and local governments have deferred IT modernization, which leaves governments with increasingly vulnerable networks and systems.
Cygilant, provider of Cybersecurity-as-a-Service to mid-sized organizations, shared recent enhancements to its SOCVue platform that improve the speed, efficiency and accuracy of how the company collaborates and solves problems for customers. The SOCVue security operations and analytics platform enables quick and effective communication between customer IT teams and Cygilant's Security Operations Center.
Match Group, the parent company of dating apps such as Tinder, on Tuesday publicly endorsed a US bill others in the tech industry fear will erode online privacy and speech in the name of fighting child abuse. US senators unveiled the bipartisan measure last week, aiming to curb images of child sex abuse by forcing tech platforms to cooperate with law enforcement on encryption or risk losing the legal immunity for what is posted on their websites.
First question for the podcast, Todd, what is open threat intelligence and what is driving it? That's really what is driving this movement, a desire to have a broader and more open view of threat intelligence.
UK Parliament's Defence Committee is to open an investigation into 5G and Huawei with a special focus on national security concerns. The House of Commons committee, made up of MPs, wants to find out for itself whether or not Huawei poses a threat to national security, something that nobody has ever raised before and which is bound to uncover lots of new and original insights.