Advertisement

security command center monitors control center getty goro denkoff

Splashtop teams with Acronis for remote security support

Scalable offering claims to allow security-focused technicians to troubleshoot problems without leaving Acronis console.


Cybersecurity

Revelstoke’s SOAR to improve case management with replicable sub-workflows

The company’s Case Automation Security Execution (CASE) management platform will use its in-house unified data layer (UDL) to develop and deploy automated, logic-based, sub-workflows for replication.


Apple Lockdown Mode
Apple Holic

Apple slaps hard against ‘mercenary’ surveillance-as-a-service industry

The company is introducing Lockdown Mode to protect high-risk individuals against corrosive surveillance and attacks, and investing millions to improve protection on its devices.


Advertisement

CSO slideshow - Insider Security Breaches - Flag of China, binary code

U.S. and UK warn local governments, businesses of China's influence operations

China uses personal, business and political relationships to gather information and influence actions. U.S. and UK government agencies urge caution.


closeup of female hand holding red marker checking off list
Cybersecurity Snippets

5 things security pros want from XDR platforms

New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform.


dhs amanda conley 3x2

How the US DHS develops hard-to-find cybersecurity skills

The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.


radar grid / computer circuits / intrusion detection / scanning

Attacker groups adopt new penetration testing tool Brute Ratel

APT group's use of a legitimate pen-testing tool gives them stealth capabilities, allowing them to avoid detection by EDR and antivirus tools.


Industry 4.0 / Industrial IoT / Smart Factory

Smart factories unprepared for cyberattacks

Smart factory operators are well aware of the cyberthreats they face but acknowledge lack of readiness to defend against them.


data pipeline primary

An updated pipeline security directive is underway, reflecting TSA struggles

The TSA directives issued after the Colonial Pipeline attack have been widely criticized, but the agency is working with the industry to improve them.


Encryption  >  A conceptual technological lock and encrypted code.

NIST names new post-quantum cryptography standards

One public-key encryption and three digital signature algorithms determined to provide the best defense against quantum attacks.


Advertisement

A vast network of identity avatars. [identity management]

What is decentralized identity?

Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity...


network security / network traffic scanning

How to keep attackers from using PowerShell against you

New guidance shows how to harden PowerShell and make it more difficult for threat actors to hijack for malicious purposes.


trojan horse malware virus binary by v graphix getty

APT campaign targeting SOHO routers highlights risks to remote workers

The ZuoRAT remote access Trojan malware can compromise multiple router brands and likely has been active for years.


A broken link in a digital chaing / weakness / vulnerability

SQL injection, XSS vulnerabilities continue to plague organizations

Errors that allow SQL injection and cross-site scripting attacks are still the top vulnerabilities that pen-testers find, especially at smaller companies.


ransomware breach hackers dark web

LockBit explained: How it has become the most popular ransomware

Criminal use of the LockBit ransomware as a service is growing rapidly thanks to updates to the malware and the decline of other ransomware gangs.