March, 2020

Security Lessons We've Learned (So Far) from COVID-19

Dark Reading

Takeaways about fighting new fires, securely enabling remote workforces, and human nature during difficult times

DOD Warns of Cyber Risks as Employees Work From Home

Data Breach Today

Defense Department to Issue Detailed Security Guidance As more of its employees shift to working from home due to the COVID-19 pandemic, the U.S. Department of Defense is warning workers to take security precautions to guard against potential hackers. It plans to release detailed guidance soon

Risk 252

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Should Location Data Be Used in Battle Against COVID-19?

Data Breach Today

US, UK, Other Nations in Talks With Tech Firms to Provide Information The Trump administration is reportedly in talks with tech companies, including Facebook and Google, to explore whether it's possible to use real-time location data from smartphones to support efforts to slow the spread of COVID-19.

Limited-Time Free Offers to Secure the Enterprise Amid COVID-19

Dark Reading

These products and services could be of immediate help to infosec pros now protecting their organizations while working from home

ABCs of Data Normalization for B2B Marketers

Data normalization. It’s not a far stretch to suggest that the topic isn’t exactly what gets marketers excited in their day-to-day workflow. However, if lead generation, reporting, and measuring ROI is important to your marketing team, then data normalization matters - a lot. In this eBook, we’ll break down the ins and outs of data normalization and review why it’s so critical for your marketing strategies and goals!

A Critical Internet Safeguard Is Running Out of Time

WIRED Threat Level

Shadowserver has helped keep the internet safe for 15 years. Unless it can raise funds fast, it's going to disappear. Security Security / Security News

IT 78

More Trending

COVID-19 Response: How to Secure a 100% Remote Workforce

Data Breach Today

Cybereason CSO Sam Curry on Business Continuity and Reducing Risk Cybereason CSO Sam Curry is no stranger to crisis - he was on the team that responded to the RSA breach in 2011.

Risk 201

What Cybersecurity Pros Really Think About Artificial Intelligence

Dark Reading

While there's a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment

Uncertain Markets May Drive Cybersecurity Consolidation

Data Breach Today

Experts: This Week's 'Black Monday' Likely to Accelerate Security M&A Activity With U.S. stock markets suffering their worst day since 1987 on Monday, most technology firms took a hit as Wall Street continues to be rattled by the COVID-19 crisis.

Living and Working Amid COVID-19 Crisis

Data Breach Today

Quarantines, lockdowns, supply chain disruptions and the biggest remote workforce in history. These all part of the "new normal" in the shadow of the COVID-19 pandemic.

173
173

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Live Coronavirus Map Used to Spread Malware

Krebs on Security

Cybercriminals constantly latch on to news items that captivate the public’s attention, but usually they do so by sensationalizing the topic or spreading misinformation about it.

NEW TECH: Byos pushes ‘micro segmentation’ approach to cybersecurity down to device level

The Last Watchdog

Many companies take an old-school approach to bringing up the rear guard, if you will, when it comes to protecting IT assets. It’s called network segmentation. The idea is to divide the network up into segments, called subnetworks, to both optimize performance as well as strengthen security. Related: A use case for endpoint encryption At RSA 2020 in San Francisco recently, I learned about how something called “micro segmentation” is rapidly emerging as a viable security strategy.

Your colleague was infected with Coronavirus, this is the latest phishing lure

Security Affairs

Security experts uncovered a new Coronavirus-themed phishing campaign, the messages inform recipients that they have been exposed to the virus.

FBI Warns of Fake CDC Emails in COVID-19 Phishing Alert

Dark Reading

Fraudsters exploit concerns by claiming to offer virus-related information or promising stimulus checks

The 2019 Technographic Data Report for B2B Sales Organizations

In this report, ZoomInfo substantiates the assertion that technographic data is a vital resource for sales teams. In fact, the majority of respondents agree—with 72.3% reporting that technographic data is either somewhat important or very important to their organization. The reason for this is simple—sales teams value technographic data because it makes essential selling activities easier and more efficient.

Privacy vs. Surveillance in the Age of COVID-19

Schneier on Security

The trade-offs are changing : As countries around the world race to contain the pandemic, many are deploying digital surveillance tools as a means to exert social control, even turning security agency technologies on their own civilians.

COVID-19 Phishing Schemes Escalate; FBI Issues Warning

Data Breach Today

Latest Schemes Target At-Home Employees; Some Spoof Health Agencies As the global COVID-19 pandemic worsens, security firms and law enforcement, including the FBI, are warning of increasing phishing and other the cybercriminal scams targeting a largely at-home workforce

Crafty Web Skimming Domain Spoofs “https”

Krebs on Security

Earlier today, KrebsOnSecurity alerted the 10th largest food distributor in the United States that one of its Web sites had been hacked and retrofitted with code that steals credit card and login data.

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Speed is what digital transformation is all about. Organizations are increasingly outsourcing IT workloads to cloud service providers and looking to leverage IoT systems. Related: The API attack vector expands Speed translates into innovation agility.

Cloud 190

The Time-Saving Power of Intent Data for Sales

By using the power of intent data, capturing buyer interest has become more feasible for sales. Not only that, but using it will save immense time during your workflow; a win-win on all fronts.

Russia-linked APT28 has been scanning vulnerable email servers in the last year

Security Affairs

Experts warn of scanning activity conducted by Russia-linked APT28 cyberespionage group, hackers are searching for vulnerable mail servers. According to security researchers from Trend Micro, the Russia-linked APT28 cyberespionage group has been scanning vulnerable email servers for more than a year.

200M Records of US Citizens Leaked in Unprotected Database

Dark Reading

Researchers have not determined who owns the database, which was one of several large exposed instances disclosed this week

114
114

A Twitch Streamer Is Exposing Coronavirus Scams Live

WIRED Threat Level

Kitboga has built a following by trolling telemarketers. Covid-19 opportunists have given him a whole new crop of targets. Security Security / Security News

Zoom Stops Transferring Data by Default to Facebook

Data Breach Today

Privacy Gaffe Blamed on Facebook's iOS Software Development Kit Zoom has apologized for sharing large sets of user data by default with Facebook, blaming the social network's software development kit, which it has removed from its iOS app.

How ZoomInfo Enhances Your Database Management Strategy

Forward-thinking marketing organizations have continuously invested in a database strategy for enabling marketing processes. Download this ebook to learn how to maintain a strategy that includes refreshed information, database cleanses, and an accurate analysis at the same time.

Coronavirus Widens the Money Mule Pool

Krebs on Security

With many people being laid off or working from home thanks to the Coronavirus pandemic, cybercrooks are almost certain to have more than their usual share of recruitable “ money mules ” — people who get roped into money laundering schemes under the pretense of a work-at-home job offer.

IT 232

NEW TECH: Security Compass streamlines the insertion of security best practices into DevOps

The Last Watchdog

DevOps is now table stakes for any company hoping to stay competitive. Speed and agility is the name of the game. And everyone’s all-in.

Ryuk Ransomware operators continue to target hospitals during COVID19 outbreak

Security Affairs

Operators behind the Ryuk Ransomware continue to target hospitals even as these organizations are involved in the fight against the Coronavirus pandemic.

Cyber Version of 'Justice League' Launches to Fight COVID-19 Related Hacks

Dark Reading

Goal is to help organizations - especially healthcare entities - protect against cybercriminals trying to take advantage of the pandemic

113
113

How ZoomInfo Enhances Your ABM Strategy

For marketing teams to develop a successful account-based marketing strategy, they need to ensure good data is housed within its Customer Relationship Management (CRM) software. More specifically, updated data can help organizations outline key accounts for their campaigns. And to begin the targeting process, marketing teams must develop an Ideal Customer Profile (ICP) with appropriate firmographic and behavioral data to ensure they’re going after the correct audience.Download this eBook to learn how to start improving your marketing team's data!

TSA Admits Liquid Ban Is Security Theater

Schneier on Security

The TSA is allowing people to bring larger bottles of hand sanitizer with them on airplanes: Passengers will now be allowed to travel with containers of liquid hand sanitizer up to 12 ounces.

Health Data Breach Tally Spikes in Recent Weeks

Data Breach Today

Will Hacking Incidents, Other Breaches Continue to Rise During COVID-19 Pandemic? The total number of health data breaches - and individuals affected - on the 2020 tally has more than doubled in recent weeks. Here are the details

Phish of GoDaddy Employee Jeopardized Escrow.com, Among Others

Krebs on Security

A spear-phishing attack this week hooked a customer service employee at GoDaddy.com , the world’s largest domain name registrar, KrebsOnSecurity has learned.