infosecurity-magazine.com – Cyber-criminals behind the Maze ransomware attacks have claimed several more scalps over the past few days, including five law firms and a French industrial giant, all of which are thought to have ha… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1239569784456568839
Stopping attacks in their tracks through behavioral blocking and containment – SANS Institute
sans.org – The nature of threats to enterprises is changing. Sophisticated and advanced threats that were mainly used by Nation State actors are now making their way to the enterprise. All the while, breaches a… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1239612976619048961
A Critical Internet Safeguard Is Running Out of Time
wired.com – Keeping the internet safe may sometimes feel like a game of Whac-A-Mole, reacting to attacks as they arise, then moving on to the next. In reality, though, it’s an ongoing process that involves not j… Tweeted by @ComplexD
Changing Company Culture Requires a Movement, Not a Mandate
hbr.org – Culture is like the wind. It is invisible, yet its effect can be seen and felt. When it is blowing in your direction, it makes for smooth sailing. When it is blowing against you, everything is more d…
How Will Covid-19 Impact the Legal Tech Sector?
artificiallawyer.com – The UK Government estimates that the peak of the Covid-19 virus will occur in the early summer (i.e. 10 to 14 weeks from now), the same may be true, or occur a bit earlier, for other countries with
SANS Security Awareness Work-from-Home Deployment Kit
sans.org – The SANS Security Awareness Work-from-Home Deployment Kit includes multiple assets that address everything from securing a home network to best practices when working remotely to identifying social e… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1239368046906675205
New Kr00k WiFi Security Flaw Potentially Impacts 1 Billion Devices
cpomagazine.com – A new WiFi security bug present on chips made by Broadcom and Cypress has likely rendered some one billion devices vulnerable to a theoretical attack that can decrypt information in transit. Called “… Tweeted by @cybersec_feeds https://twitter.com/cybersec_feeds/status/1239292891136229376
Xerox Releases Statement Related to COVID-19 and its Proposal to Acquire HP
news.xerox.com – Xerox Holdings Corporation (NYSE: XRX) (“Xerox”) today issued the following statement: “In light of the escalating COVID-19 pandemic, Xerox needs to prioritize the health and safety of its employees,… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1239517805294358528
Hackers find new target as Americans work from home during outbreak
thehill.com – Experts are warning of a new wave of cyberattacks targeting Americans who are forced to work from home during the coronavirus outbreak. There is increasing evidence that hackers are using the concern… Tweeted by @evankirstel https://twitter.com/evankirstel/status/1239002099825991680
REVULN 20×3 Call For Papers ≈ Packet Storm
packetstormsecurity.com – REVULN 20×3: Call for Speakers / Call for Papers ================================================ REVULN 20×3 is an international conference taking place on 2020 September 9-10 in Bangkok (Thailand) … Tweeted by @cybersec_feeds https://twitter.com/cybersec_feeds/status/1239167256233476096
Improving Your Bottom Line With Cybersecurity
sloanreview.mit.edu – COVID-19 Resources from MIT SMR The 11 Sources of Disruption Every Company Must Monitor Special Spring Issue: Disruption 2020 Podcast: The Lies Leaders Tell Themselves About Disruption Cybersecurity … Tweeted by @winnitude https://twitter.com/winnitude/status/1239161200207892482
#cybersecurity | #hackerspace | “Please Inform Your Readers”: Best and Worst Visualizations of COVID-19 | National Cyber Security | Hacker News
nationalcybersecurity.com – I’ve written several times recently about big data and visualization issues for the COVID-19 pandemic. As a long-time researcher of big data security, the most important problem space always has been… Tweeted by @NCSbyHTCS https://twitter.com/NCSbyHTCS/status/1239135828883968000
Kevin Mitnick – The Most Infamous Hacker of All Time – Cyber Experts
cyberexperts.com – The art of hacking has been in development for many years. The heyday of hacking was before the Internet even existed. There are amazing and exciting stories about hackers who hacked for notoriety, m… Tweeted by @privacy2all https://twitter.com/privacy2all/status/1239124686165983232
Don’t Pay Cyber Ransoms, Officials Warn
wsj.com – Paying ransomware isn’t illegal, though authorities have long warned against giving in to hackers’ demands, saying that doing so fuels more attacks and doesn’t guarantee data recovery. In July, the U… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1238527852867391492
Industry Forecast for Data Breaches 2020: What All Smartphone Users Should Know | All About eDiscovery
allaboutediscovery.com – As we become increasingly reliant upon our phones, we make ourselves more vulnerable to cyberattacks. Indeed, Experian’s 2020 edition of its annual Data Breach Industry Forecast details five predicti… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1238804629653241858
You are invited to join a webinar: How to minimize disruption during a pandemic.
zoom.us – Description It’s impossible to predict the extent to which your business will be impacted by the coronavirus. But you’ll want to act quickly and decisively on the issues you face today and prepare fo… Tweeted by @SpecialCounsel https://twitter.com/SpecialCounsel/status/1238160022984708098
This free service shows who has your data—and helps you delete it
fastcompany.com – Companies storing people’s personal data increasingly give consumers the ability to delete their accounts and other information. In fact, it’s often required by new privacy laws like the California C… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1238122333019275264
Modernizing Legacy Tech: Big Bang or Piecemeal?
cmswire.com – Modernization of legacy systems seems to be all the rage in IT. Organizations are racing to modernize their systems, at times replacing systems that are functioning well and efficiently. This complet… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1238106229169414144
Hacks on Louisiana Parishes Hint at Nightmare Election Scenario
bloomberg.com – Governor John Bel Edwards in Baton Rouge on Nov. 16. Photographer: Matt Sullivan/Getty Images North America (Getty Images) By Kartikay Mehrotra | Bloomberg February 12, 2020 at 4:50 AM EST James Wrot… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1238098666625392641
Hey, You, Get Off Of My Cloud: Cybersecurity Considerations For Managed Service Providers
abovethelaw.com – It should come as no surprise that cloud computing has taken the consumer and business world by storm over the past decade. From Platform-as-a-Service offerings for businesses (Office 365 anyone?) to… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1238434692212363265