ev2.perigonlive.com – The creative use of captives and other forms of alternative risk financing offers risk managers a means to better manage their total cost of risk during a difficult insurance market. This session wil… Tweeted by @advcyberrisk https://twitter.com/advcyberrisk/status/1291056389796892684
SANS Institute Outlines Path to Effective Security Metrics Use
prnewswire.com – BETHESDA, Md., Aug. 4, 2020 /PRNewswire/ — Metrics for security are in wide use in organizations today, with over 80% of respondents to a new SANS Institute survey claiming some level of maturity on… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1291134395726929921
Sharing is Caring? ayfie Group Lists on Merkur Market of Oslo Stock Exchange
complexdiscovery.com – A short percentage-based assessment of the qualitative benefit of the recent post sharing extracts related to the listing of ayfie on the Merkur Market of the Oslo Stock Exchange. Editor’s Note: High… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1291348716989878276
cyberark/SkyArk
github.com – AzureStealth – Scans Azure environments AWStealth – Scan AWS environments SkyArk currently focuses on mitigating the new threat of Cloud Shadow Admins, and helps organizations to discover, assess and… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1291295698130997248
Cyber Criminals Unleash A Phony Recovery Tool On Ransomware Victims
forbes.com – Hard-working cyber security professionals have released scores of free decryption tools for ransomware over the years. A new tool released for one of the most widely-distributed strains of ransomware… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1290769477177675777
blackberry/pe_tree
github.com – Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro to dump in-memory PE files and reconstruct imports. Python module for vie… Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1290912926891536388
GIAC Continues to Launch New Certifications for Cybersecurity Skill Needs
prnewswire.com – BETHESDA, Md., Aug. 4, 2020 /PRNewswire/ — Despite the economic, social, and political changes that have taken place across the globe due to Covid-19, the importance of information security hasn’t c… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1290731751992696839
Missing Something? Topic Modeling in eDiscovery
complexdiscovery.com – A short percentage-based assessment of the qualitative benefit of the recent post sharing Herb Roitblat’s paper on topic modeling in eDiscovery. Editor’s Note: As an author, contributor, and speaker … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1291002390632595456
The Dangers of Remote Working and How to Adapt | Privacy & Data Security | Fox Rothschild LLP
foxrothschild.com – In the weeks leading up to the issuance of stay-at-home orders, forward-looking businesses took that time to ensure that VPN connections and remote virtualization solutions were robust enough to hand… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1290959993676726274
Top law firms like Kirkland & Ellis and Jones Day have delayed their first-year associate classes. Here’s everything we know about new start dates, pay, and benefits so far.
businessinsider.com – With no near end to the coronavirus pandemic in sight, many major law firms like Kirkland & Ellis, Jones Day and Paul Weiss are pushing back their start dates for incoming first-year associates. The … Tweeted by @SpecialCounsel
Travelers Europe Strengthens CyberRisk Product
businesswire.com – LONDON–(BUSINESS WIRE)–Travelers Europe today announced it has enhanced its cyber insurance product, Travelers CyberRisk, to provide more coverages and risk management solutions to strengthen custo… Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1290282973858865153
As CCPA Enters Enforcement, the Cost of Email Mistakes Becomes Clear
corporatecomplianceinsights.com – With the CCPA now in effect, CISOs must understand the various ways a data breach can occur – chief among them: human error. Egress founder and CEO Tony Pepper explains how human behavior is the bigg… Tweeted by
HaystackID and NightOwl Global Merge
complexdiscovery.com – HaystackID and NightOwl Global Combine in Merger to Create Global eDiscovery Leader Leading eDiscovery Service Providers Combine and Enter Next Stage of International Expansion and Enterprise Growth … Tweeted by @ComplexD https://twitter.com/ComplexD/status/1290630303107645445
HomePwn – Swiss Army Knife for Pentesting of IoT Devices
hakin9.org – HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day work and inside the same working environment. It is designed to find d… Tweeted by @WolfSec_ch https://twitter.com/WolfSec_ch/status/1290184187761307648
Ehtools – Framework Of Serious Wi-Fi Penetration Tools
hakin9.org – Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework provides serious penetration tools that can be explored easily from within it. This powerful and simple tool … Tweeted by @iamanusmith https://twitter.com/iamanusmith/status/1290176395335720960
Maritime Cybersecurity-The Challenges, Best Practices and Risk Mitigation
tripwire.com – Ships are increasingly using systems that rely on digitalization, integration, and automation, which call for cyber risk management on board. As technology continues to develop, the convergence of in… Tweeted by @TripwireInc https://twitter.com/TripwireInc/status/1290198229829554178
Many Cyberspace Solarium Commission recommendations expected to become federal law
csoonline.com – Several cybersecurity proposals are advancing in both the US House and Senate that flow from the prolific work of the public-private brainstorming initiative called the Cyberspace Solarium Commission… Tweeted by @CSOonline https://twitter.com/CSOonline/status/1290256100428660739
The Digital Workplace Accelerates
reworked.co – The digital transformation of work, which was already picking up momentum in prior years, accelerated significantly in 2020. Survey data over the past four years shows a steady increase of organizati… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1290253338425151489
How the FBI tracked down the Twitter hackers
zdnet.com – After earlier today US law enforcement charged three individuals for the recent Twitter hack, with the help of court documents released by the DOJ, ZDNet was able to piece together a timeline of the … Tweeted by @Mazebolt
How An Israeli VC Firm Gives Its Founders A Direct Line To C-Suites At Microsoft, Google And Nike
forbes.com – Hunters CTO Tomer Kazaz and CEO Uri May have developed a product that uses AI to recognize patterns … [+] in the security measures operating across big companies’ platforms. YL Ventures Most of the… Tweeted by @cybersec_feeds https://twitter.com/cybersec_feeds/status/1289818946753843200