Thu.Jun 13, 2019

Empower Employees While Preventing Insider Data Breaches

Data Breach Today

Massive DDos attack hit Telegram, company says most of junk traffic is from China

Security Affairs

Encrypted messaging service Telegram was hit by a major DDoS attack apparently originated from China, likely linked to the ongoing political unrest in Hong Kong.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

House Approves Lifting HHS Ban on Unique Patient IDs

Data Breach Today

Amendment - Part of a Funding Bill - Still Has a Long Way to Go The House of Representatives has approved an amendment that would lift a 20-year ban on the Department of Health and Human Services funding the development or adoption of a unique, national patient identifier.

7 Truths About BEC Scams

Dark Reading

Business email compromise attacks are growing in prevalence and creativity. Here's a look at how they work, the latest stats, and some recent horror stories


The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Top Drivers for Privileged Account Management

Data Breach Today

Grant Burst of Wallix Says Operational Technology Driving More PAM Rollouts When it comes to drivers for implementing and maintaining privileged access management programs, Wallix's Grant Burst says that demonstrating compliance and safety remain top priorities.

IoT 160

More Trending

Proactive Mitigation: A Cybersecurity Imperative

Data Breach Today

Akamai's Jay Coley on Blunting Hackers by Blocking Emerging Types of Attacks A top cybersecurity imperative for organizations is to "take proactive mitigation before an event even occurs" by tracking attack trends and mitigating against emerging types of attacks, says Akamai's Jay Coley

DNS Firewalls Could Prevent Billions in Losses to Cybercrime

Dark Reading

New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year


Ransomware paralyzed production for at least a week at ASCO factories

Security Affairs

Malware infections could be devastating for production environments, a ransomware infection halts production operations for days at airplane parts manufacturer ASCO. ASCO , is of the world’s largest manufacturers of aerospace components.

DNS Firewalls Could Save Companies Billions

Dark Reading

New analysis shows widespread DNS protection could save organizations as much as $200 billion in losses every year


Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

Millions of Exim mail servers are currently under attack

Security Affairs

Hackers are targeting millions of mail servers running vulnerable Exim mail transfer agent (MTA) versions, threat actors leverage the CVE-2019-10149 flaw.

Cyberattack Hits Aircraft Parts Manufacturer

Dark Reading

Belgium's Asco has shut down manufacturing around the world, including the US, in response to a major cybersecurity event, but what happened isn't clear

Gain Certification Skills and Earn Digital badges at Enterprise World 19

OpenText Information Management

Now more than ever, technical certifications help launch and accelerate careers. In technology roles, advancing your career is about demonstrating the skills you bring to an organization and the value you can add, not simply how long you’ve been in the industry.

BlueKeep RDP Vulnerability a Ticking Time Bomb

Dark Reading

One month after Microsoft disclosed the flaw, nearly 1 million systems remain unpatched, and Internet scans looking for vulnerable systems have begun increasing


The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

9 Top Active Directory Security Tools

eSecurity Planet

Active Directory can't protect against every security risk. Here are 9 Active Directory security tools that can help

Risk 89

Congress Gives 'Hack Back' Legislation Another Try

Dark Reading

Officials reintroduce a bill that would let businesses monitor attacker behavior and target intruders on corporate networks


What is data protection by design and default

IT Governance

If your organisation is subject to the GDPR (General Data Protection Regulation) , you’re probably aware of your requirement to “implement appropriate technical and organisational measures” to protect the personal data you hold.

Black Hat Q&A: Defending Against Cheaper, Accessible 'Deepfake' Tech

Dark Reading

ZeroFox's Matt and Mike Price discuss their work researching cybersecurity responses to the rising tide of 'deepfake' videos

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

How to Dominate the Domains of the NEW CIP - D3: Digitalizing Core Business Processes


Welcome back to this continuing series on the updated Certified Information Professional (CIP) exam. In this post, I'll be focusing on Domain 3, Digitalizing Core Business Processes.

Paper 87

The CISO's Drive to Consolidation

Dark Reading

Cutting back on the number of security tools you're using can save money and leave you safer. Here's how to get started

WAGO Industrial Switches affected by multiple flaws

Security Affairs

A security expert at SEC Consult discovered that some WAGO industrial managed switches are affected by several serious vulnerabilities. A security researcher at consulting company SEC Consult discovered several vulnerabilities in some models of WAGO industrial switches.

The Chief Data Officer: A Key Advocate for Information Governance


The role of Chief Data Officer (CDO) is becoming more prevalent in many organizations as their strategic goals evolve to meet the challenges of the fast-growing, data-centered economy. What Does the CDO Do?

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Flaw in Evernote Web Clipper for Chrome extension allows stealing data

Security Affairs

Security experts discovered a vulnerability in the popular Evernote Web Clipper for Chrome can be exploited to steal sensitive data from sites visited by users.

The Rise of 'Purple Teaming'

Dark Reading

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team


Report on the Stalkerware Industry

Schneier on Security

Citizen Lab just published an excellent report on the stalkerware industry. citizenlab gdpr privacy reports surveillance


Google Adds Two-Factor Authentication For Its Apps on iOS

Dark Reading

Android-based two-factor authentication now works for Google applications on iPad and iPhone

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Rocket.Build 2019: Raising the bar year after year

Rocket Software

Some of my favorite memories as a kid were family picnics in the summer. From a kid’s perspective, it’s clear why. I had more friends and family to play with than usual, and I could eat as much food as I wanted (an obvious win.)

IT 74

The Rise of "Purple Teaming"

Dark Reading

The next generation of penetration testing represents a more collaborative approach to old fashioned Red Team vs. Blue Team


Evernote Critical Flaw Opened Personal Data of Millions to Attack


Evernote's web clipper extension for Chrome is vulnerable to a critical flaw that could have exposed the data of more than 4.6 million users. Vulnerabilities Web Security chrome browser critical vulnerability cross site scripting attack evernote Evernote extension Proof of Concept