Enhancing PCI DSS Compliance: The Urgent Need for Risk-Based Prioritization
17
Feb
2024

Enhancing PCI DSS Compliance: The Urgent Need for Risk-Based Prioritization

By Ian Robinson, Chief Architect of Titania Keeping U.S. commercial critical national infrastructure (CNI) organizations safe is vital to national…

How Businesses Can Manage Cryptocurrency Fraud
17
Feb
2024

How Businesses Can Manage Cryptocurrency Fraud

With cryptocurrency payments on the rise, businesses must learn how to safeguard against potential risks. By James Hunt, Subject Matter…

Hackers
17
Feb
2024

FBI disrupts Russian Moobot botnet infecting Ubiquiti routers

The FBI took down a botnet of small office/home office (SOHO) routers used by Russia’s Main Intelligence Directorate of the…

It’s Time to End the Myth of Untouchable Mainframe Security.
17
Feb
2024

It’s Time to End the Myth of Untouchable Mainframe Security.

By Al Saurette, CEO, MainTegrity, Most large organizations, including 70% of Fortune 500 companies, rely extensively on mainframes for managing…

From the SIEM to the Lake: Bridging the Gap for Splunk Customers Post-Acquisition
17
Feb
2024

From the SIEM to the Lake: Bridging the Gap for Splunk Customers Post-Acquisition

By Omer Singer, VP of Strategy, Anvilogic The smoke has cleared on Cisco’s largest acquisition ever: that of Splunk for…

New Study Shows Over Half of Organizations Experienced Significant Security Incidents in The Last Year
17
Feb
2024

New Study Shows Over Half of Organizations Experienced Significant Security Incidents in The Last Year

In a newly released study from International Data Corporation (IDC) and cybersecurity company Exabeam, research shows companies globally are struggling…

Ukrainian national faces up to 20 years in prison for his role in Zeus, IcedID malware schemes
17
Feb
2024

Ukrainian national faces up to 20 years in prison for his role in Zeus, IcedID malware schemes

Ukrainian national faces up to 20 years in prison for his role in Zeus, IcedID malware schemes Pierluigi Paganini February…

Pkl - Apple’s config lang
17
Feb
2024

Pkl – Apple’s config lang

최근에 Apple이 내부에서 사용하던 Configuration language를 오픈소스로 공개헀습니다. 바로 Pkl(피클)인데요, 과연 Pkl은 JSON과 YAML과 함께 Config의 스타가 될 수 있을까요?…

Chrome
17
Feb
2024

New Google Chrome feature blocks attacks against home networks

Google is testing a new feature to prevent malicious public websites from pivoting through a user’s browser to attack devices…

The Kyivstar Breach and Its Implications for Global Cybersecurity
17
Feb
2024

The Kyivstar Breach and Its Implications for Global Cybersecurity

[By Richard Bird, Chief Security Officer, Traceable] In the wake of the devastating cyber-attack on Kyivstar, Ukraine’s largest telecommunications service…

Google Launches 'AI Cyber Defense Initiative' At The Munich Security Conference
17
Feb
2024

Google Launches ‘AI Cyber Defense Initiative’ At The Munich Security Conference

17 Feb Google Launches ‘AI Cyber Defense Initiative’ At The Munich Security Conference This week in cybersecurity from the editors…

How to Not Get Scammed Out of $50,000
17
Feb
2024

How to Not Get Scammed Out of $50,000

Plus: State-backed hackers test out generative AI, the US takes down a major Russian military botnet, and 100 hospitals in…