sociable.co – Let’s take a look at some of the fearless female leaders who are currently making waves in the cloud marketplace in 2021. Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1471495813490561026
Mitratech Acquires Continuity
complexdiscovery.com – Mitratech, a leading provider of legal, risk, and compliance software, today announces that it has acquired Continuity, a cloud-based GRC technology and advisory solution for banks, credit unions and… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1471476370811363330
HaystackID® Names Dave Murray as Chief Financial Officer
haystackid.com – HaystackID, a specialized eDiscovery services firm supporting law firms and corporate legal departments, has announced Dave Murray as its new Chief Financial Officer. Tweeted by @ComplexD https://twitter.com/ComplexD/status/1471201020579659782
NIST Launches New International Cybersecurity and Privacy Resources Website
nist.gov – Every day, NIST cybersecurity and privacy resources are being used throughout the world to help organizations manage cybersecurity and privacy ri Tweeted by @ComplexD https://twitter.com/ComplexD/status/1471131477320638477
It could take years for applications using vulnerable version of Java log4j library to be patched, says expert
itworldcanada.com – Infosec leaders around the world are being urged to heed warnings from national computer emergency teams, software suppliers and cybersecurity experts about a critical logging-related vulnerability i… Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1471465475104194561
Log4Shell update: Attack surface, attacks in the wild, mitigation and remediation
helpnetsecurity.com – Log4Shell update: CVE-2021-44228 affects only versions 2.x of Apache Log4j (i.e., Apache Log4j 2), according to security researchers. Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1471465475104194561
Going Meta
netdiligence.com – The metaverse is here, and no matter what tech companies promise us, we should start protecting our data. NetDiligence’s own Micah Howser gives us his take on what is to come. Tweeted by @NetDiligence https://twitter.com/NetDiligence/status/1470819113194954758
What to Do While Waiting for the Log4J Updates
darkreading.com – This Tech Tip outlines how enterprise defenders can mitigate the risks of the Log4j vulnerabilities for the short-term while waiting for updates. Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1470789457737625610
Analyzing the Impact of the Many New Rules of Cybersecurity
aceds.org – This article originally appeared in Cybersecurity Law & Strategy. © ALM Media LLC. Reprinted with permission. The federal government is trying to find as many ways as possible to handle the cybersecu… Tweeted by @acedsonline https://twitter.com/acedsonline/status/1470850765258383373
Exterro Software Demo
go.exterro.com – According to G2 Crowd reviewers, Exterro beats Relativity on: Tweeted by @acedsonline https://twitter.com/acedsonline/status/1470861179618795521
Three Steps You Can Take to Give Your Security Culture Superpowers Inspired by the Marvel Universe
journalofcyberpolicy.com – GUEST POST by Amanda Fennell The echoes of 2020 have reverberated into 2021 with another record-breaking year for data compromises. According to The Identity Theft Research Center the number of publi… Tweeted by @RelativityHQ https://twitter.com/RelativityHQ/status/1470816454308245515
The War on Data? Artificial Intelligence and Autonomous Systems Through the Lens of NATO
complexdiscovery.com – The new CCDCOE report provides a snapshot of the perspectives and ambitions held by each NATO nation in relation to military AI and outlines their current use of AI technologies. Tweeted by @ComplexD https://twitter.com/ComplexD/status/1470750855464902657
Hackers Exploit Log4j Vulnerability to Infect Computers with Khonsari Ransomware
thehackernews.com – Hackers Exploiting Log4j Vulnerability to Infect Windows PCs with Khonsari Ransomware Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1470713322492153858
A 2021 Look at eDiscovery Collection: Task, Spend, and Cost Data Points
complexdiscovery.com – In evaluating the market spend for the eDiscovery task of collection through the lens of relative task expenditures and modeled market estimations, spending on collection-related software and service… Tweeted by @ComplexD https://twitter.com/ComplexD/status/1470058119921291269
Unused identities: A growing security threat
helpnetsecurity.com – To eliminate unused identities risks, we need to transition to a state where we are ingesting data and remediating constantly. Tweeted by @bamitav https://twitter.com/bamitav/status/1470289552338128896
Report: State-owned French Transport Giant Exposes 10,000s of Staff to Fraud in Massive Data Breach
vpnmentor.com – vpnMentor’s research team discovered a data breach in a server belonging to the French transport giant RATP. Tweeted by @securixhk https://twitter.com/securixhk/status/1470123870631903239
Navy’s handling of classified electronic storage under investigation after secret data lost | CBC News
cbc.ca – Ten years after a spy scandal rocked the Canadian military, the navy still has trouble keeping track of electronic storage devices with secret and classified data on them. Two Canadian warships were … Tweeted by @VERISDB https://twitter.com/VERISDB/status/1470217325227872261
Oz Feds reveal distribution model behind backdoored ‘An0m’ chat app spread by crims – ThreatsHub Cybersecurity News
threatshub.org – ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News. Tweeted by @threatshub https://twitter.com/threatshub/status/1470209703405768704
A Simple Exploit is Exposing the Biggest Apps on the Internet
vice.com – iCloud, Steam, Minecraft, and several others are all vulnerable to a vulnerability that is trivially easy for hackers to exploit. Tweeted by @SANSInstitute https://twitter.com/SANSInstitute/status/1469366842359701505
Extremely Critical Log4J Vulnerability Leaves Much of the Internet at Risk
thehackernews.com – A new highly critical RCE vulnerability in the Java-based Log4J logging library affects a large number of applications and services on the Internet. Tweeted by @TheHackersNews https://twitter.com/TheHackersNews/status/1469522411770974209