Current News November 2022
Click the button to toggle between dark and light mode for this page.
Outline-Read and Annotate without distractions(A good way to remove extra stuff from websites)
Krebs on Security-In Depth Security News and Investigation
Google Transparency Report- Requests for User Information (Interesting find)
Gibson Research Corp-Needle in the Haystack
List of FREE Cybersecurity Services and Tools
Summary of Changes from PCI DSS Version 3.2.1 to 4.0- March 2022
Data Breach Investigations Report from Verizon
Careers in Cybersecurity- Interviews about positions in Cybersecurity
CyberSeek- Hack the gap- Interactive map for careers in US
Microsoft Digital Defense Report 2022
11/8/2022-Microsoft, GitHub, and OpenAI accused of software piracy, sued for $9 billion in damages
11/7/2022- National Guard to offer midterm elections cybersecurity help
11/7/2022- Solarwinds agrees to pay $26 million to settle shareholder lawsuit over data breach
11/7/2022-China is likely stockpiling and deploying vulnerabilities
11/7/2022- Solving security and privacy concerns in emerging technology
11/4/2022-Red Cross eyes "digital emblem" for cyberspace protection
11/3/2022-Former Apple employee admits to defrauding Cupertino and IRS out of 18.8 million dollars
11/2/2022- Kanban vs. Scrum, 10 Key Differences
11/2/2022-Snack giant settles with insurer over $100 million claim tied to 2017 NotPetya attacks
11/2/2022- Hundreds of US new sites push malware in supply-chain attack
11/2/2022-Cybersecurity strategies to enable digital trust
11/1/2022- Russia linked to near 75 percent of late 2021 ransomware attacks
11/1/2022-Data initiatives to guide enterprises through The Great Resignation
10/31/2022-UK police fail to use facial recognition ethically and legally
10/28/2022-The top cybersecurity trends to be aware of in 2023
10/28/2022-Cyberattacks are bypassing multifactor authentication
10/27/2022-Prepare now for critical flaw in OpenSSL warns security experts
10/27/2022-Embracing zero trust for cybersecurity-CompTIA
10/26/2022-FTC slaps down Drizly CEO after 2.4 million uers records stolen from careless booze app biz
10/26/2022-Why digital transformation projects are bleeding organizations dry & ways to avoid the same fate
10/26/2022-Unlock an API-first security strategy to tackle popular attack vectors
10/26/2022-Top three mistakes IT security teams still make
10/26/2022- More companies are buying cyber coverage: Zurich, Advisen
10/25/2022-Privacy assembly in Istanbul calls for adaptation to new necessities
10/25/2022-Australia seeks stiffer penalty for data breaches amidst spate of security incidents
10/24/2022-Stress is driving cybersecurity professionals to rethink roles
10/24/2022-European police warn of metaverse cyber-threats
10/24/2022- Health entity says tracking code breach affects 3 million
10/24/2022-Taking a risk-based approach to pen testing
10/20/2022- Suella Braverman quitting over email faux pas stark warning for businesses, cybersecurity experts say
10/19/2022- Cybersecurity Tops the CIO Agenda as Threats Continue to Escalate
10/19/2022-Emotional toll from cyberattacks can linger among staff for years
10/18/2022-Data privacy is expensive-here's how to manage costs
10/18/2022-4 cybersecurity considerations for smart factories
10/18/2022-Millennials and Gen Z less likely to observe cybersecurity protocols than their elders
10/18/2022-Many public safety agencies remain unequipped to defend against cyberattacks
10/17/2022-Cybersecurity Awareness Month: Eight Security Insights That You Should Know
10/17/2022- Tech Hiring: Is the Tech Job Boom Fizzling Out Amidst Layoffs? 2 areas that are still growing
10/17/2022- The Cybersecurity Skills Gap: Dispelling Misconceptions
10/14/2022- Microsoft 365 Message Encryption Can Leak Sensitive Info
10/14/2022- Six Social Engineering Techniques Popular with Scammers
10/12/2022- Death to Passwords: Beta passkey support comes to Chrome and Android LOOK AT ARTICLE ON PHISHING RESISTANT MFA ON OCT 6 FOR MORE DETAILS
10/12/2022- Securing the US Electricity Grid from Cyberattacks
10/12/2022- Killnet Targets US Airports in New Wave fo DDoS Attacks, Calls on Hacktivists to Target Civilian Infrastructure
10/10/2022- Awareness a challenge for CIOs pursuing 'whole-of-state' cyber
10/6/2022- 5 Things to Know While Hiring a Java Dev
10/6/2022- IoT Harmony? What Matter and Thread really mean for your smart home
10/6/2022- What is Phishing Resistant MFA?
10/5/2022- Addressing the Complexities of Cybersecurity at Fintech Enterprises
10/4/2022-Australia's Telstra hit by data breach, two weeks after attack on Optus
10/4/2022-Hackers stole data from US defense org using Impacket, CovalentStealer
10/4/2022- Russian Hackers Take Aim at Kremlin Targets
10/3/2022- Microsoft Exchange server zero-day mitgation can be bypassed
10/3/2022- Defense Department ready to overhaul data practices
10/3/2022- Inside the Mind of a C-Suite Executive: What to Expect in Cybersecurity in 2023
10/3/2022-The Impact of Cybersecurity on Consumer Behavior
10/1/2022- Privacy-focused browsers struggle to gain traction
9/30/2022- Cyberwar in Ukraine: What You See is Not What's Really There
9/30/2022- How the Pandemic Changed On-Premise Storage & What to Expect in the Future
9/28/2022- 56% of Hospitality IT Leaders Cite Cybersecurity As A Top Business Concern
9/28/2022- Know Thy Enemy: Why RagnarLocker Remains a Significant Threat to Critical Infrastructure
9/28/2022- Internet-Exposed Protocols Remain Easy Entry Point for Attackers
9/28/2022- How small businesses can embrace data governance
9/27/2022- The US is the top target of ransomware attacks
9/27/2022- NDR vs EDR vs XDR- Which is Right for your Cybersecurity Stack?
9/26/2022- The Deepfake Danger: When it wasn't you on that Zoom call
9/23/2022-Mystery Hacker exposes Indonesian cyberdefense failures
9/23/2022- A Guide to Stopping Global Cyber Crime at the Local Level
9/21/2022-FBI: Iranian Hackers lurked in Albanias government network for 14 months
9/21/2022-Unpatched 15 year old Python bug allows code execution in 350k projects
9/20/2022- Report: US businesses experience 42 cyberattacks per year
9/20/2022-Why the CFO is Crucial to Your Company's Cybersecurity
9/19/2022- Uber links breach to Lapsus$ group, blames contractor for hack
9/19/2022- LastPass Found No Code Injection Attempts Following August Data Breach
9/19/2022- International cooperation is key to fighting threat actors and cybercrime
9/16/2022- How Hackers Hack and the Tools They Use
9/16/2022- EU Cyber Resilience Act-Readies rules for smart devices with fines
Link to Cyber Resilience Act-SHARE WITH CLASS
9/15/2022- How to Improve Data Backup & Resiliency Plan
9/15/2022- Report: Only 10 percent of organizations had higher budget for cybersecurity, despite increased threat landscape
9/14/2022-Digital Trust: The Convergence of Privacy and Security
9/14/2022- Meta, TikTok, YouTube and Twitter dodge questions on social media and national security-SHARE WITH CLASS
Senate committee hearing on social media's impact on homeland security video (PBS News)
9/13/2022- Financial execs may be overconfident about cybersecurity: Survey
9/13/2022- Cybersecurity a Top Ed-Tech Priority for States, But Funding Lags
9/13/2022- C2-as-a-Service Portal Dark Utilities Now Boasts Over 3,000 Criminal Subscribers
9/13/2022- Why we need biometrics for authentication
9/13/2022- Report: How Cyberattacks Hurts Patient Care and Mortality Rates
9/12/2022- The Cyber Security Head Game
9/12/2022- Small businesses are at risk for cyberattacks. Here's how to address them
9/11/2022- Increased Mortality Rates Linked to Cyber-Attacks Against Healthcare Organizations
9/7/2022- Medical device vulnerability could let hackers steal Wi-fi credentials
9/7/2022- Agency wants industry input for incident reporting rules
9/7/2022- Hotel giant IHG blames cyberattack for booking systems outage
9/6/2022- Microsoft Sounds Out Last and Final Call to Users to Migrate Away from Basic Auth
9/5/2022- How hospitals can address medical device vulnerabilities
9/4/2022- Concerns emerge over proposed SEC cyber incident disclosure changes
9/2/2022- Taking Security Strategy to the Next Level: The Cyber Kill Chain vs. MITRE ATT&CK
9/2/2022- Tech Tool offers police mass surveillance on a budget
9/2/2022- Ransomware as a Service: Unraveling this Ecosystem
9/1/2022- Over 1,000 iOS apps found exposing hardcoded AWS credentials
9/1/2022- Police secretly use smartphone location data culled from Waze, Starbucks, and other location popular apps SHARE WITH CLASS
9/1/2022- Dark Web of Cybersecurity Concerns Rising With Gig Economy
8/31/2022- Evil Corp Cybercriminal Syndicate Poses Threat to Healthcare Cybersecurity
8/30/2022- Key Takeaways from the Open Cybersecurity Schema Format SHARE WITH CLASS
8/30/3022- Russian streaming platform confirms data breach affecting 7.5M users
8/30/2022- Location data sales are out of control, and should be made illegal [Opinion]-SHARE WITH CLASS
8/30/2022- How to use data governance for AI/ML systems
8/30/2022- Protecting Macs Against Ransomware
8/29/2022- Strengthening cybersecurity with digital twin thinking
8/25/2022- Scammers Create "AI Hologram" of C-Suite Crypto Exec
8/25/2022- Privacy and security issues associated with facial recognition software
8/24/2022- Efficient MagicWeb Malware Subverts AD FS Authentication, Microsoft Warns
8/24/2022- UK advises joint ventures on cybersecurity
8/24/2022- Ransomware playbooks are critical to incident response
8/24/2022- How 2023 cybersecurity budgets allocations are shaping up
8/23/2022- Ransomware: Most attacks exploit these common cybersecurity misktakes- so fix them now, warns Microsoft
8/22/2022- Over 80,000 exploitable Hikvision cameras exposed online
8/22/2022- A nightmare scenario: Data-tampering attacks are hard to detect, with devastating consequences
8/22/2022- 10 steps to prevent cyberattacks on industrial control systems
8/21/2022- Hackers target hotel and travel companies with fake reservations
8/19/2022- Will President Biden's Cybersecurity Bills Stand the Test of Time?
8/18/2022- Which Security Bugs Will Be Exploited? Researchers Create an ML Model to Find Out
8/17/2022- An experiment showed that the military must change its cybersecurity approach when thinking about compliance
8/17/2022- DOE invests $45 million in cyber technology that protects power sector
8/17/2022- Minimizing law firm cyberrisk
8/17/2022- Security tools only work if the network is visible
8/16/2022- PC store toldit can't claim full cyber-crime insurance after social-engineering attack- SHOW TO CLASS
8/16/2022- Losses from crypto hacks surged 60% to $1.9 billion from January to July
8/16/2022- Six Essentials for Protecting Cloud and Kubernetes Applications
8/15/2022- 3 ways China's access to TikTok data is a security risk
8/15/2022- Study shows that Businesses lack adequate cyberinsurance coverage
8/15/2022- Burned Out: InfoSec Professionals Sound the Alarm
8/13/2022- Google fined $60 million over Android location data collection
8/11/2022- Automotive hacking- the cyber risk auto must consider
8/10/2022- The importance of stopping identity sprawl for cybersecurity
8/9/2022- Recovering From a Cybersecurity Earthquake: 4 Lessons Companies Must Learn
8/9/2022- One of 5G's Biggest Features Is a Security Minefield
8/5/2022- Cybersecurity information disclosure system adds a level
8/4/2022- Cloud data security and innnovation can coexist
8/4/2022- Log Data Management and 10 Movies and TV Shows that It Changed Forever
8/4/2022- Taiwanese military reports DDoS in wake of Pelosi visit
8/4/2022- Is Standardization Required For Security?
8/4/2022- The Whys and the Hows of Getting Into Web3
8/4/2022-Cybersecurity and the Metaverse: Patrolling the New Digital World
8/3/2022- Do You Policy Documents Represent Current Practices?
8/3/2022- Cyberspace should be seen as a military domain
8/3/2022- UK Cyberagency warns Tories about voting security flaw
8/3/2022- American Express, Snapchat Open-Redirect Vulnerabilities Exploited in Phishing Scheme
8/2/2022- Post-quantum encryption contender is taken out by single-core PC and 1 hour
8/2/2022- Cybersecurity in the Time of Remote Threats
8/1/2022- We're Spending Billions Each Year on Cybersecurity. So Why Aren't Data Breaches Going Away?
7/29/2022- EPA preps cyber rule for water sector
7/26/2022- SaaS Security Risk and Challenges
7/25/2022- Quantum Computing: How Qubits Could Change the World of Cybersecurity
7/25/2022- Addressing Security Risks to Medical IoT Devices
7/22/2022- TSA revises cybersecurity requirements for oil and gas pipelines
7/18/2022- TikTok Engaging in Excessive Data Collection
7/15/2022- What Can Internal Auditors Do to Increase Cybersecurity Audit Effectiveness?
7/14/2022- To Upgrade Network Software or Not: Why is that even a question?
7/13/2022- Network endpoints proliferate in age of IoT
7/13/2022- Stop Passing the Privacy Hot Potato
7/13/2022- Let's Rethink Cybersecurity Training Investment
7/12/2022-Regulators increase focus on cybersecurity in finance
7/12/2022- Experts say US must not let EU lead on cybersecurity
7/12/2022- 5 Effective Best Practices for Data Governance Success
7/11/2022- Department of Homeland Security publishes space policy
7/11/2022- Ransomware gang now lets you search their stolen data
7/11/2022- Python Programming: PyPI is rolling out 2FA for critical projects, giving away 4,000 security keys
7/10/2022- Maastricht University wound up earning money from its ransomware payment
7/8/2022- SMBs are behind in adopting multi-factor authentication
7/8/2022- Biden executive order calls for reproductive health privacy protections
7/7/2022- DNSSEC: The Revolution Needed to Fix Our Domain Name System
7/7/2022- Space Force coming to grips with cybersecurity threats
6/10/2022- Key elements to build an effective data virtualization architecture
6/10/2022- What Is ML Bias and Where Can We See It?
6/9/2022- Reduce Risk with a Cloud Security Maturity Model
6/8/2022- The Future of Quantitative Cyberrisk Reporting
6/8/2022- How to manage artificial intelligence risk and security: Focus on five priorities
6/8/2022- Hackers have earned millions selling your data on the dark web- how to stay safe
6/8/2022- Multifactor authentication could be long haul for some federal agencies, CISA official says
6/8/2022- Time to update: Google's Android updates fixes 41 flaws, five critical
6/8/2022- Ransomware Pressure Forces UK CISOs to Consider Quitting
6/6/2022- Supply Chain Risk Management: Where Do We Start?
6/6/2022- How the Russian-Ukraine war makes ransomware payments harder
6/6/2022-Microsoft won't say if it will patch critical Windows vulnerability under exploit
6/6/2022- Defensive Cyber Attacks Declared Legal by UK Attorney General
6/3/2022-Bipartisan draft bill breaks stalemate on federal data privacy negotiations
6/3/2022- The Digital Gold Rush: Football, Ransomware and the Bottom Line
6/3/2022- It is Possible to Disclose a Cyberattack in 4 days?
6/2/2022- Ransomware gang now hacks corporate websites to show ransom notes
6/2/2022- What Comes from Requiring Local Gov to Report Cyber Incidents?
6/2/2022- Singapore mandates 'kill switch' for banks as safeguard against online scams
6/1/2022- Why you need cybersecurity on the farm
5/31/2022- Criminal marketplaces are selling university login credentials online, FBI warns
5/31/2022- UK announces Data Reform Bill to reduce compliance burden and ease reuse for research
5/27/2022- What does it mean for cybersecurity to "align with the business"?
5/27/2022- The Metaverse Is Already Here: No Special Code or Equipment Required
5/25/2022- As Ukraine conflict continues, US Banks still face threats from Russian cyberattacks
5/25/2022- PA lawmaker proposes new online data privacy bill
5/25/2022- What Do New Cybersecurity Rules Mean for the Cloud, ITSM and ITAM?
5/13/2022-Understanding the Full Digital Trust Ecosystem
5/13/2022- Cybersecurity Learning: Building a Culture fo Cyber Awareness
5/12/2022- Quarter of Security Pros Say Mental Health Has Worsened
5/12/2022- Prepare for What You Wish For: More CISOs on Boards
5/12/2022- Microsoft: May Windows updates cause AD authentication failures
5/11/2022- FDA Bill Includes Medical Device Security Requirements for Manufacturers
5/11/2022- The Needed Societal Response to Cybersecurity Risk in the COVID Era
5/10/2022- Industry pushes back against India's data security breach reporting requirements
5/10/2022- Zero-click attacks explained, and why they are so dangerous
5/10/2022- Connecticut Enacts Consumer Privacy Law
5/10/2022- California Assembly Proposes Data Privacy Law for Workers
5/9/2022-Building a Strong Business Case for Security and Compliance
5/9/2022-Regulator Proposes $1 Million Fine for Colonial Pipeline One Year After Cyberattack
5/9/2022-Zero Trust Does Not Imply Zero Perimeter
5/9/2022-The Top Six Cybersecurity Risks Facing Your Small Business
5/9/2022- Metaverse: The Future of the Internet of a Security Threat?
5/6/2022-Apple, Google, and Microsoft Take a Step Closer to a Passwordless Future
5/6/2022-Cryptocurrency regulators are scrambling to catch up with hackers who are swiping billions
5/5/2022-White House: Prepare for cryptography-cracking quantum computers
5/5/2022-New Raspberry Robin worm uses Windows Installer to drop malware
5/5/2022- Dark Web vs. Deep Web: 5 Key Differences
5/4/2022-Security Stuff Happens: What Will the Public Hear When You Say You've Been Breached?
5/4/2022-Sandbox AQ CEO: Enterprises must prep for quantum threats
5/4/2022-Github requires all coders to use 2FA by end of 2023
5/4/2022-Why Cybersecurity isn't just tech's problem-it's HR's
5/3/2022-Oregon Faces Class-Action Lawsuit After Vaccine Data Release
5/3/2022-Top mental health apps are 'data sucking machines' that could be trading your sensitive information "
5/3/2022- 4 Ways SECs New Proposed Rules Put Cybersecurity Front and Center
5/3/2022- High-Stakes Cyber Claims Demand Quick Action
5/3/2022-Solarwinds hackers set up phony media outlets to trick targets
5/3/2022-Secrets to building a healthy CIS0-vendor partnership
5/2/2022-Indiana Amends Data Breach Notification Law
5/2/2022- Watch: Risks for NGOs in times of cyberwarfare
5/2/2022- Kentucky Becomes 21st State to Adopt Model Cyber Security Law for Insurers
5/2/2022- New Regulations in India Requires Orgs to Report Cyber Incidents Within 6 Hours
5/1/2022-5 Key Industries in Need of IoT security
4/30/2022-The Army Wants to Change How It Manages Cyber Risk
4/29/2022-Connecticut inches closer to becoming fifth state with data privacy law
4/29/2022- Failure to Patch and the Rare Case of the Java Crypto Hack
4/29/2022- Tech Talk: How ServiceNow is Scaling Robotic Process Automation (RPA) at Speed
4/28/2022-Top 5 security analytics to measure
4/28/2022- These 15 Vulnerabilities Were the Most Commonly Exploited in 2021
4/28/2022-Russia Sanctions Complicate Paying Ransomware Hackers
4/27/2022- Ransomware Hit 56% of K-12 Organizations Worldwide in 2021
4/27/2022- Twenty Ways Information Security Has Become More Challenging in the Past 20 Years
4/26/2022- Accelerated attacks drastically reduce time to ransom
4/26/2022- Stopping Cyberattacks Is Top Priority for Ed-Tech Leaders. But Many Underestimate the Risk
4/25/2022- DDos attacks in Q1 2022
4/24/2022- The Next Cybersecurity Crisis: Poisoned AI
4/22/2022-Attacks on Cooperatives During Planting and Harvest More Likely
4/21/2022- Pentagon eyeing the cloud to help firms meet CMMC cybersecurity requirements
4/14/2022- Russia's AI setbacks will likely heighten its cyber aggression
4/13/2022- US warns of govt hackers targeting industrial control systems
4/13/2022- Supporting cybersecurity literacy for workforce-ready graduates
4/13/2022- Five Key Considerations for Improving IT Supply Chain Security
4/12/2022- Microsoft: New malware uses Windows bug to hide scheduled tasks
4/12/2022- Congress aims for next step to safeguard critical infrastructure
4/12/2022- FCC Chair Claims Cybersecurity Role Congress Crafted for CISA
4/12/2022- Cybersecurity in a COVID-19 World: Insights on How Decisions are Made (PDF available)
4/10/2022- Singapore begins licensing cybersecurity vendors
4/6/2022- Explainable Artificial Intelligence (XAI): Useful But Not Uncontested
4/6/2022- Darknet Megamarket Hydra Gets Dismantled, but Russian-Speaking Admins Still at Large
4/6/2022- US Government and Energy Firms Close Ranks, Fearing Russian Cyberattacks
4/6/2022- DoJ takes down Russian botnet that targeted WatchGuard and Asus routers
4/5/2022- Australia warns of money recovery phishing luring past victims
4/5/2022- Addressing the Biggest Challenges in Cloud Security
4/4/2022- Cybersecurity Mesh:IT's Answer to Cloud Security
4/4/2016- New and less known cybersecurity risks you should be aware of
4/4/2022- Meet Borat, the New RAT in Town You Can't Afford to Miss
4/4/2022- GitHub can now auto-block commits containing API keys, auth tokens
4/1/2022- Data Breaches Fuel Financial Fraud
4/1/2022- Our private health information may be the target of a cyberattack. Are US Hospitals ready?
4/1/2022- Ukraine, Conti, and the law of unintended consequences
4/1/2022- Zero trust in business cyber security
3/31/2022- Council Updates Data Security Standards for Payments Industry
3/31/2022- Attackers compromise 94% of the critical assets within four steps of initial breach
3/30/2022- Why metrics are crucial to proving cybersecurity programs' value
3/30/2022- US construction tech firms brace for increased cyberattacks
3/30/2022- Cybercrime statistics legislation is ready for president's signature
3/30/2022- The NATO Cyberresponse Dilemma
3/29/2022- Lapsus and Solarwinds hackers both use the same old trick to bypass MFA
3/28/2022- Organisations Outmatched by Nation-State Hackers, Survey Finds
3/23/2022- Health Data Breaches Swell in 2021 Amid Hacking Surge
3/23/2022- States Step Up Cybersecurity Efforts as Threats Increase
3/23/2022- Is Your Organization Monitoring the Dark Web Yet?
3/23/2022- An Integrated Approach to Security Audits
3/23/2022- Cyber Workforce: Out of the Ashes and Into the Fire
3/23/2022- Lapsus Claims Okta Breach, Triggering Fears of Digital Supply Chain Attacks
3/22/2022- Hillicon Valley- Biden's child privacy call gets backers
3/21/2022- Cybersecurity Red Team 101
3/21/2022- Six Questions CISOs should ask if their cybersecurity vendor if acquired
3/21/2022- FDIC: Banks Reporting More Sophisticated Cyber Attacks Since Start of Pandemic
3/21/2022- Geopolitical Unrest, Cyberattacks Spotlight Board Duties
3/21/2022- Microsoft Investigating Claims of Hacked Source Code Repositories
3/20/2022- Global Cybersecurity Ramifications from the War in Ukraine
3/18/2022-Franchises, partnerships emerge in Ransomware-as-a-Service operations
3/18/2022- Britain, U.S. warn of satellite communications risks after Ukraine hack
3/17/2022- FBI Launches Virtual Assets Unit
3/17/2022- Lock and Key: Compromised Credentials and Growing Ransomware Threats
3/16/2022- Strong Cyber Accountability at Board Level a Must
3/15/2022- Improving Cybersecurity Incident Response
3/15/2022- SEC Proposes Cybersecurity Disclosure Requirements
3/14/2022- How Data Protection Can Benefit From Artificial Intelligence
3/11/2022- UK Announces Legislation to Govern Digital Identity Security
3/10/2022-Ukraine-Russia Conflict: Will It Worsen the Global Semiconductor Shortage?
3/10/2022- Financial Firms Brace for More Cyber Threats After Trying 2021
3/10/2022- The Importance fo Tabletop Cybersecurity Exercises
3/9/2022- Biden's cryptocurrency executive order addresses illicit financial risks
3/9/2022-US Courts mixed on letting data suits go forward
3/8/2022- Top Five Women in InfoSec and the Role Models Who Inspire Them
3/8/2022- Taking a Clear-Eyed View of the Road Ahead for Women in Security
3/7/2022- Why the Future of Work Depends on PC Fleet Stability and Predictability
3/7/2022- Cloud Essentials: How Shifting To ELT (Extract, Load, Transform) Can Help you Succeed
3/7/2022- SATCOM terminals under attack in Europe: a plausible analysis
3/7/2022- Three Cybersecurity Companies to Offer Free Protection to US Hospitals and Utilities Amid Concerns of Hacking Attacks
3/7/2022- Samsung confirms Galaxy device source code leaked after breach
3/7/2022- Privacy activists launch new offensive against non-compliant cookie banners
3/7/2022- Google and Meta Mount Offensive Against Australian Privacy Law, Touting the Benefits of Ad-Supported Services
3/7/2022- How Attackers Sidestep the Cyber Kill Chain SHARE WITH CLASS
3/7/2022- Poor Employee Cyber Hygiene is Putting Healthcare Cybersecurity at Risk
3/6/2022- Tips to Protect Yourself from Cyberattacks with Crisis in Ukraine
3/5/2022- Malware now using NVIDIAs stolen code signing certificates
3/4/2022- What is RBAC? Role-based access control explained
3/3/2022- AI brings greater resilience to self-healing endpoints
3/2/2022- Avoiding the Chaotic 5G Rollout at Airports
3/2/2022-Ukraine-Russia Crisis: Hacker Groups Take Sides as the Crisis Escalates
3/2/2022- A Five-Layer View of Data Center Systems Security
3/2/2022- The Ukraine/Russia information war is forcing companies to choose a side
3/2/2022-Senate passes major cybersecurity legislation to force reporting of cyberattacks and ransomware
3/2/2022- Hacker group becomes victim after siding with Russia
3/2/2022- Cybersecurity flaws found in 75% of smart infusion pumps
3/2/2022- What to Look for in a Cybersecurity Resume
3/2/2022- How Rwanda's data protection, privacy law will benefit users
3/1/2022-Ransomware Attackers Begin to Eye Midmarket Acquisition Targets
3/1/2022-Why companies are moving to a 'zero trust' model of cybersecurity
3/1/2022- Ransomware demands up 20% in second half of 2021
3/1/2022- Crowd-sourced attacks present new risk of crisis education
2/28/2022- US Banks prepare for cyber attacks after latest Russia sanctions
2/28/2022- Building Resilience into your cybersecurity strategy
2/28/2022- CISA, FBI warn US orgs of WhisperGate and HermeticWiper malware
2/28/2022- Toyota halts production after reported cyberattack on supplier
2/28/2022-Crypto 101: Data Privacy and Security on Cryptocurrency Platforms
2/28/2022- Breach Notification: Poor Transparency Complicates Response
2/27/2022- Elon Musk activiates Starlink to help keep Ukraine's internet up and running
2/27/2022- Forget Data= Privacy is the New 'New Oil'
2/26/2022- US firms should be wary of destructive malware unleashed on Ukraine, FBI and CISA warn
2/25/2022- New York rolls out statewide cyber command center amid Russian attacks in Ukraine
2/25/2022-A Lesson for the Cybersecurity Community
2/25/2022- Top 5 Interview Questions to Ask DevOps Candidates in 2022
2/25/2022- Top Tech Solutions to Reduce Burnout and Enhance Productivity
2/24/2022- US Banks Are Prepared for Russia Sanctions, but Concerns Grow About Potential Hacks
2/24/2022- Letting artificial intelligence into farming could open world's food supply to hackers
2/24/2022- How To Minimize Disruption When Security Vulnerabilities Are Revealed
2/24/2022-The Power of Three: DLT, Cryptocurrency and CBDC
2/24/2022- Ransomware used as decoy in data-wiping attacks on Ukraine
2/23/2022- What Cyberprofessionals Should Know About CUI (Controlled Unclassified Information)
2/23/2022- Into the Light with Discovery: It's Time to Rethink Shadow IT
2/23/2022- US Receives Ransomware Warning
2/23/2022- Top IT skills to build in 2022, according to CIOs
2/23/2022- Dragos: Ransomware topped ICS and OT threats in 2021
2/23/2022- Ransomware extortion doesn't stop after paying the ransom
2/23/2022- Cybersecurity Nonprofits Form 'Nonprofit Cyber' Coalition (PDF Document) SHARE WITH CLASS
2/22/2022- A Data Collection Project at GW Leads to Privacy Questions SHARE WITH CLASS
2/19/2022- CISA warns of hybrid operations threat to US critical infrastructure
2/18/2022- Privacy Sandbox for Android: A Genuine Privacy Move by Google or a PR Gimmick?
2/18/2022-CISA Launches New Catalog of Free Public and Private Sector Cybersecurity Services SEE LINK NEAR THE TOP
2/18/2022- Hearing Probes Aims, Enforcement of a US Digital Privacy Law
2/18/2022- NIST wants public input on updates to Cybersecurity Framework, supply chain security
2/18/2022- Security assets management should buttoned down. It isn't.
2/17/2022- 4 Reasons to Prioritize Remote Manageability and Endpoint Security in the Hybrid Work Era
2/17/2022- Skyrocketing cryptocurrency bug bounties expected to lure top hacking talent
2/15/2022- Pandemic-related cybercrime exacerbated by skills shortage
2/15/2022-The Evolution of Audit in the Wake of the Pandemic
2/14/2022-Texas alleges Facebook's facial recognition practices violated privacy protections
2/14/2022- The Fastest Growing Tech Jobs in 2022 and How to Land Them
2/13/2022- Panicked about the cost to reduce cyber attacks?
2/12/2022- Shields Up: CISA Warns American Companies About Russian Hacking
2/11/2022- Cyberattack on Harbour Plaza hotels in Hong Kong exposes personal data of more than 1.2 million guests
2/11/2022-We need more women in tech. Could apprenticeships bridge the gap?
2/11/2022-Adam Georgeson: IT technician jailed for revenge cyber-attacks SHARE WITH CLASS
2/11/2022- Google Project Zero: Vendors are now quicker at fixing zero-days
2/11/2022-Senators Want More out of SEC Plans to Address Cyberattacks
2/10/2022-University Project Cataloged 1,100 Ransomware Attacks on Crtical Infrastructure
2/10/2022- IT Priorities: What IT Buyers are Looking for in 2022
2/10/2022- Euro zone banks face rising cyber threats amid geopolitical tensions
2/10/2022- NIST, HHS on Automating Data Collection for Cybersecurity
2/10/2022- An Ethical Hacker's Guide to External Attack Surface Management
2/10/2022- France's privacy watchdog latest find Google Analytics breaches GDPR SHARE WITH CLASS
2/9/2022-UK,US,Australia issue joint advisory: Ransomware on the loose, critical national infrastructure affected
2/9/2022- The DOJs 3.6B Bitcoin Seizure Shows How Hard It Is to Launder Crypto
2/9/2022- SEC Proposes Cybersecurity Risk Management Rules and Amendments for Registered Investment Advisers and Funds
Cybersecurity Risk Management Fact Sheet from SEC article above
2/9/2022-EU, US regulators tell banks to prepare for Russian cyberattack threat
2/9/2022-Cybersecurity Investments Soared in 2021
2/7/2022- 5 Ways to Improve the Governance of Unstructured Data
2/7/2022- CISA to Sponsor Inaugural US Cyber Team at the International Cybersecurity Challenge
2/4/2022- Talk to the board, not just IT, about ransomware
2/4/2022-Experts: Schools Will Have to Step It Up, Pay More to Get Cyberinsurance This Year
2/3/2022-SEC Sets Vote on Cyber Rules for Advisors
2/3/2022-Cybersecurity: Many Managers just don't want to understand the risks
2/2/2022- Report Provides Insights on Evolving Privacy Landscape
2/2/2022-DHS assembles Cyber Safety Review Board to imitate fed agency that studies aviation accidents
2/2/2022- Cybersecurity and Data Privacy- What to Expect in 2022
2/2/2022-Integrating New Vulnerability Management Capabilities Into A Comprehensive Cybersecurity Strategy
2/2/2022- Cyber Insurance Does Not Replace Need For Cybersecurity Program
2/2/2022-Cryptocurrency platform Wormhole hacked for an estimated $322 million
2/2/2022-DHS establishes review board for cyber incidents affecting the federal government
2/1/2022- Achieving Workforce Diversity in Cybersecurity
2/1/2022- US Sends Top Cyber Official to Europe Amid Ukraine Crisis
2/1/2022-The Evolution of Informations Systems Audit
2/1/2022- US Companies Face More Restrictions After Privacy Ruling Against Google
2/1/2022-OpenSSF Announces The Alpha-Omega Project to Improve Software Supply Chain Security for 10,000 OSS Projects
1/31/2022-CISA Director offers governors advice on talking about cyber
1/31/2022- FBI urges athletes to keep personal devices at home, use burners during Beijing Winter Olympics
1/31/2022-Crazy quilt of state privacy laws could cost businesses $1 trillion
1/31/2022- Rural towns say they need a hand to fight off hackers and ransomware
1/31/2022- Data thieves seek user credentials
1/31/2022- 5 Cybersecurity threats in franchising
1/29/2022-Human firewalls are key to cyberdefense
1/28/2022-UK support for Ukraine poses cyberthreat risk to businesses
1/28/2022-Silkworm security? Researchers create new authentication method using silk fibers
1/28/2022- You landed that tech job interview- now here's how to get through it (SHOW TO CLASS)
1/27/2022- Government Expands Public-Private Cybersecurity Partnership to Water Sector
1/27/2022- Biggest Ransomware Attacks of 2021: A Look Back at the Chart Toppers
1/27/2022- The Power of Passwordless Authentication: Fortified IT Administration
1/27/2022- Why Security Does Not Equal Privacy
1/27/2022- Learning from Cybersecurity Stats: What's the Best Way to Limit Your Data Exposure?
1/27/2022-How Businesses Can Make The Four Great Hopes For Women in Tech a Reality
1/26/2022-Cybersecurity Culture May Be Cause of Breaches
1/26/2022-Data residency laws pushing companies toward residency as a service
1/26/2022- Experts Urge Firms to Patch Trivial-to-Exploit Flaw in Linux PolicyKit
1/26/2022- Cybersecurity: White House rolls out zero trust strategy for federal agencies
1/26/2022- Moving the US Government Toward Zero Trust Cybersecurity Principles (actual White House PDF document)
1/26/2022- Let's Encrypt is revoking lots of SSL certificates in two days
1/26/2022- German Government Warns of APT27 hackers backdooring business networks
1/26/2022- Ransomware is still the biggest security worry for business, but it's not the only headache
1/26/2022- Cybersecurity increasingly on audit committee agendas
1/25/2022-CMMC 2.0 will safeguard military operations data
1/25/2022-Canada's foreign affairs ministry hacked, some services down
1/25/2022-Introducing Scanning Made Easy, the Nmap Scripting Engine (SHARE WITH CLASS)
1/24/2022- SEC Chief Wants Advisors, BDs to Improve Cyber Hygiene
1/24/2022- DHS Sounds Alarms on Potential for Major Russian Cyberattacks on US
1/24/2022- Red vs. Blue vs. Purple Teams: How to run an effective exercise
1/23/2022- FBI warns of malicious QR codes used to steal your money
1/21/2022- NSA gains authority over government agencies' networks
1/21/2022- UK, Australia, to build network of liberty that will deter cyber attacks before they happen
1/20/2022-Crypto.com shares details on security breach: 483 accounts compromised
1/20/2022- IV pumps riskiest healthcare IoT, while 50% of medical devices hold critical flaws
1/19/2022-Boosting Cyberresilience for Critical Enterprise IT Systems With COBIT and NIST Cybersecurity Frameworks
1/19/2022-Biden to Expand National Security Agency Role in Government Cybersecurity
1/19/2022-UK Proposes to Expand Vital Services Cybersecurity Law
1/19/2022-Cybersecurity Compliance Requirements May Surprise Higher Education
1/19-/022- Top 15 Cybersecurity Interview Questions to Prepare for in 2022 (And How to Answer Them)SHARE WITH CLASS
1/19/2022- IRS Will Soon Require 'Selfies' for Online Access
1/19/2022- Senate passes bill aimed at ransomware, data breaches
1/19/2022- Nine Non-Tech Skills IT Workers Should Master to Thrive in the Automation Era
1/19/2022- Philippines bank will no longer use clickable website links on promo materials
1/18/2022- How Brainjacking Became a New Cybersecurity Risk in Health Care
1/18/2022- 10 Career Goals for CIOs in 2022
1/18/2022- Saskatchewan Liquor Stores Can Once Again Order Stock Weeks After Liquor Authority Hack
1/18/2022- Cybersecurity lies and the Lying Liars Who Tell Them
1/18/2022- GDPR fines jump to $1.2 Billion in 2021 due largely to Big Tech
1/18/2022-Telegram is a hotspot for the sale of stolen financial accounts
1/17/2022-Goodwill's shopping platform hacked
1/17/2022- NATO, Urkaine Sign Deal to 'Deepen' Cyber Cooperation
1/17/2022- UK Government Ignites Debate Over Privacy vs. Safety
1/17/2022- Top IT Certfications for 2022 (International Focus)
1/17/2022- Account Breaches Set a Record in 2021
1/15/2022- Salesforce REQUIRING MFA for all customers/FAQs
1/14/2022-Cyberattack hits Ukraine as US warns Russia could be prepping for war
1/14/2022- White House confirms person behind Colonial Pipeline ransomware attack nabbed during Russian REvil raid
1/14/2022- White House Meets With Software Firms and Open Source Orgs on Security
1/13/2022- US Chamber of Commerce, others urge Congress to pass privacy legislation
1/13/2022- Cybersecurity and the generation gap
1/12/2022- Five Best Tools to Keep Log4j Vulnerability Exploitations At Bay
1/12/2022-Pentagon Moves to Improve its Cybersecurity-Centered Engagement with Universities
1/12/2022- Can IGA Solve Business Security Challenges?
1/11/2022-Deepfakes scams are coming. Is Your Business Ready?
1/11/2022-A Security Awareness Program for PCI DSS Compliance: Implementation and Legal and Ethical Issues to be Considered
1/11/2022-Cybersecurity challenging private equity firms
1/11/2022- A Brief History of the Cybersecurity Profession
1/11/2022- 7 Hot Cybersecurity Trends in 2022
1/10/2022-Microsoft: powerdir bug gives access to protected macOS user data
1/10/2022- URL parsing: A ticking time bomb of security exploits
1/7/2022- FBI: Hackers use BadUSB to target defense firms with ransomware
1/7/2022- IT/OT Convergence Is More Than a Catchy Phrase
1/7/2022- Walmart may have violated Chinese cybersecurity law
1/7/2022- Google, Facebook Fined by French Data Protection Agency
1/6/2022- How Your Employees Can Prevent and Detect Cybersecurity Threats
1/5/2022- New Attack Campaign Exploits Microsoft Signature Verification
1/5/2022- Senators seek update on DHS, DOT cybersecurity efforts for transportation systems
1/5/2022- 3 Steps for Tackling Cybersecurity This Year
1/5/2022- Cybercriminals find new way to distribute ZLoader virus
1/5/2022-More Governance Now Than Ever
1/4/2022- FTC warns companies to secure consumer data from Log4J attacks
1/4/2022- 2021 Left Unfinished Cybersecurity Business
|