Congress' Select Committee on the Chinese Communist Party published a report warning that Beijing could use a Chinese state-owned crane company that currently dominates the global ship-to-shore port crane market to disrupt and manipulate the United States maritime supply chain.
Welcome to Information Security Media Group's Black Hat and DEF CON 2024 Compendium featuring latest insights from the industry's top cybersecurity researchers and ethical hackers, as well as perspectives from CEOs, CISOs and government officials on the latest trends in cybersecurity and AI.
Authentication requiring stored credentials is not only vulnerable to phishing and other compromises, but using these credentials can also be cumbersome for busy clinicians, said Tina Srivastava, co-founder of Badge, a provider of deviceless, tokenless authentication technology.
Cutting kernel mode dependencies and adopting safe deployment practices will make endpoint systems more resilient and secure for Windows customers. Tuesday's meeting came two months after a faulty CrowdStrike update disrupted 8.5 million Windows machines and caused $5.4 billion in direct losses.
Rural and small hospitals and other healthcare providers often complain that a lack of resources is a major factor stunting their cybersecurity maturity. But even when offered free or discounted cyber assistance, many of these organizations aren't signing up.
This week, cyberthreats rising in Mexico; FBI warned of BEC scams; U.K. police arrested hacking suspect; Avis, Slim CD, Medicare and Fortinet disclosed breaches; Highline public schools reopened after cyberattack; a critical flaw was found in WHOIS; and Konni upped attacks on Russia, South Korea.
Data integrity, collection, analytics - they all are essential for compliance reporting, and yet each remains a challenge for enterprises across business sectors. Siva Vrs of Wipro discussed the pain points with compliance in the cloud era and Wipro's partnership with AWS to alleviate them.
In this interview with...
Learn the top five use cases for Splunk Enterprise Security
We need to help security teams speed up their response times while reducing the number of security alerts they get. We can start by improving visibility into their environment, so they can detect and respond to threats faster. Better yet, an automated...
Your security team faces significant challenges in today's threat landscape. They grapple with analyzing data noise and trying to gain visibility across hybrid, cloud and on-prem environments – all while being inundated with vast amounts of data from various security and IT sources. It’s a struggle to address...
An AI-powered virtual care provider's unsecured database allegedly exposed thousands of sensitive mental health and substance abuse treatment records between patients and their counselors on the internet - where they were available to anyone, said the security researcher who discovered the trove.
ColorTokens purchased PureID, expanding its zero trust framework with identity-based segmentation for cloud and hybrid environments. The acquisition focuses on securing cloud applications, microservices and APIs through advanced identity-based authentication.
A major global real estate firm encountered challenges with data exfiltration risks and limited visibility into user behavior, particularly as employees transitioned to remote work. The firm aimed to protect its data while giving employees the flexibility to perform their duties. By implementing advanced security...
Amazon S3 is a best-in-class solution for storing structured and unstructured data, but many organizations are unaware of the crucial steps needed to fully secure their information. In this webinar, we'll dive deep into the world of Amazon S3 security, debunking common myths and revealing the true nature of data...
Healthcare organizations often face obstacles in sharing cybersecurity information. Phil Englert and Errol Weiss from Health-ISAC advocate for shifting the focus from legal risks to business risks, improving incident response and building resilience through collaboration and transparency.
Operators behind a mysterious botnet named for a TCP routing port number are expanding the universe of targeted devices and taking steps to hide their infrastructure, warn Sekoia researchers. The 7777 - or Quad7 - botnet appears to have emerged in 2023.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.