sans.org – Cyber threat intelligence has a wide range of use-cases for security practitioners. Over the past few SANS cyber threat intelligence forums we’ve focused on tactical level insights and lessons learne… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1242808489623326720
TrickBot Mobile App Bypasses 2‐Factor Authentication for Net Banking Services
thehackernews.com – The malware authors behind TrickBot banking Trojan have developed a new Android app that can intercept one-time authorization codes sent to Internet banking customers via SMS or relatively more secur… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1242845129326518273
Training Together: The #SANSTrainFromHomeChallenge Is Here!
sans.org – With the global transition into working and studying remotely in full swing, we at SANS have been brainstorming ways to make your experience at home a little more exciting. We’ve come up with a cool … Tweeted by
A Model for Interoperability? Open Cybersecurity Alliance Unveils First Open Source Language to Connect Security Tools
complexdiscovery.com – Press Announcement by the Open Cybersecurity Alliance Open Cybersecurity Alliance Unveils First Open Source Language to Connect Security Tools The Open Cybersecurity Alliance (OCA) today [February 24… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1242788976920088589
Do You Care About Privacy as Much as Your Customers Do?
hbr.org – Until recently, there has been little compelling reason for companies to embed privacy considerations deeply into their larger business strategies. While consumers say they care about privacy, few ha… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1242762409640628226
Cyber Daily: Ex-CIA Engineer Goes on Trial for Alleged Leak of Hacker Tools
wsj.com – Follow @WSJCyber on Twitter for more cybersecurity and privacy news. Former CIA engineer goes on trial for massive leak. Joshua Schulte, a former software engineer for the Central Intelligence Agency… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1242151005229285381
Mitigate Credential theft with Administrative Tier Model
windowssecurity.ca – A lot of organizations have a credential hygiene problem without knowing that they have it. It’s one of the common reasons why attackers are managing to obtain Domain Dominance so easily in a corpora… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1242089877203640320
Online Survey Software | Qualtrics Survey Solutions
survey.sans.org – Javascript is required to load this page. Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1242173027195990016
Estonia created Suve, a state-approved automated chatbot to provide trustworthy information during the COVID-19 situation — Invest in Estonia
investinestonia.com – Suve is already working on the webpages of Government of Estonia, Estonia’s Health Board, Ministry of Social Affairs, Work in Estonia, International House of Estonia and Invest in Estonia and TV3 – w… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1242434367022141440
Protect your Meetings From Zoom Bombers
craigball.net – Distanced by Coronavirus, lawyers and teachers are flocking to the teleconferencing platform Zoom to meet and share screens. Zoom is also turning up as a way to emulate face-to-face social interactio… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1242418140933435392
How AI Enables Enterprises to Get the Most Out of Their Data
cmswire.com – Recently, we took a dive into a new study from Nucleus Research on artificial intelligence and its current uses. The study uncovered a wide number of different trends, including the rush by many ente… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1241789750643744768
Pathways to Technology: A Virtual Panel with Women in Tech at Relativity
eventbrite.com – Colleen Costello is the Head of Social Impact at Relativity. In this role, Colleen is responsible for the strategic design and implementation of Relativity’s corporate social responsibility programmi… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1241741645525254147
Court Orders and Updates During COVID-19 Pandemic
uscourts.gov – Federal courts are individually coordinating with state and local health officials to obtain local information about the coronavirus (COVID-19), and some have issued orders relating to court business… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1242068766827204608
Canada Cybersecurity: Health Care Industry Battles Cyberattacks as Experts Call-in Federal Support
ehackingnews.com – Canada’s hospitals and clinics are suffering massive cyber threats as the cyberattacks targeting the Canadian healthcare industry saw a sudden rise in number. Researchers reported that the health-car… Tweeted by @EHackerNews https://twitter.com/EHackerNews/status/1242027695925374976
The Federal Security Service (FSB) of the Russian Federation purchased equipment for hacking smart devices – Hacker group Digital Revolution
ehackingnews.com – Hacker group Digital Revolution published documents according to which the FSB ordered the creation of the Fronton program for organizing cyberattacks using the Internet of things devices. According … Tweeted by @machine_ml https://twitter.com/machine_ml/status/1241991359080341504
Pandemic Drives Temporary Changes in Antitrust Investigations from DOJ and FTC
complexdiscovery.com – Editor’s Note: Taken from Federal Trade Commission (FTC) and the Antitrust Division of the Department of Justice (DOJ) press releases related to the developing COVID-19 pandemic, the following two an… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1241502357466333186
Our Customers | e-Discovery Software | Relativity
relativity.com – “We had numerous conversations with our clients and they all said the same thing: ‘We want insights into everything going on with our matters.’ So, Matter Intelligence evolved into a transparency-foc… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1241469775047462912
20: Amanda Fennell | Stellar Women in e-Discovery
stellarwomeninediscovery.simplecast.fm – Stellar Women co-hosts Mila Taylor and Mary Rechtoris interviewed Amanda Fennell, chief security officer at Relativity, following her recent win of the ISE North America’s People’s Choice award. Toge… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1241379325473144834
Top Ten Reasons To Use Cloud Backup – Network Midlands
network-midlands.co.uk – Ease of use – the simple set and forget features of the software mean that you simply choose what you want backed up and when. On demand or on a set schedule your data is automatically sent to
Square’s Cofounder on Discovering — and Defending — Innovations
hbr.org – Jim McKelvey, entrepreneur and cofounder of Square, says that most companies that think of themselves as innovative are really just copycats. True innovation, he argues, is about fearlessly exploring… Tweeted by @machine_ml https://twitter.com/machine_ml/status/1241628994312769536