article thumbnail

Note to Self: Create Non-Exhaustive List of Competitors

Krebs on Security

Mine was learning that KrebsOnSecurity is listed as a restricted competitor by Gartner Inc. Nor have I ever offered paid consulting or custom market research (although I did give a paid keynote speech at Gartner’s 2015 conference in Orlando , which is still by far the largest crowd I’ve ever addressed).

Marketing 221
article thumbnail

What is a Cyberattack? Types and Defenses

eSecurity Planet

However, basic cybersecurity tools and practices, like patching , strong passwords , and multi-factor authentication (MFA), “can prevent 80 to 90% of cyberattacks,” said Anne Neuberger, deputy national security advisor for cyber and emerging technologies, during a White House press conference in Sept. Types of Cyberattacks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Poorly protected local government networks cast shadow on midterm elections

The Last Watchdog

The attack also brought cybersecurity to the local level. It’s easy to think of it as a problem the federal government must address or something that enterprises deal with, but cybersecurity has to be addressed closer to home, as well. This makes government networks even more vulnerable and hackers see them as a gold mine.

article thumbnail

Zero Trust Speeds Ransomware Response, Illumio-Bishop Fox Test Finds

eSecurity Planet

That means hackers will increasingly mimic nation-state threat groups by establishing a long-term presence inside networks to mine highly sensitive data. The results were announced today at the Black Hat USA 2022 cybersecurity conference. See the Best Zero Trust Security Solutions. Zero Trust Security Testing.

article thumbnail

The Hacker Mind Podcast: Hacking Communities

ForAllSecure

Vamosi: So before we go to Vegas again before we return to sector or any of the other favorite conferences we might attend. You see, Mills, you see cotton gins, you see mines that have shut down, you see places and every now and then there's somewhat of a success story. And you know the hollow empty factories in different places.

Mining 52
article thumbnail

The Hacker Mind: Hackers Wanted: Filling the Cybersecurity Skills Gap

ForAllSecure

In this episode, Sonny Sandelius , Assistant Director of the SANS workforce programs, talks about programs that recruit people from outside computer sciences, encouraging those from diverse backgrounds who share the curiosity and the basic aptitude necessary to become hired cybersecurity professionals in as little as six months.

article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

Hong Kong, 16.11.2018 – Group-IB, an international company that specializes in preventing cyber attacks, presented the findings of its latest Hi-Tech Crime Trends 2018 report at the FinTech Security Conference in Hong Kong organized by Binary Solutions Limited in partnership with Group-IB.