Sat.Jan 25, 2020 - Fri.Jan 31, 2020

The Fractured Future of Browser Privacy

WIRED Threat Level

Better anti-tracking measures have become the norm for Chrome, Firefox, Safari, and other modern browsers. But they still disagree on how exactly they should work. Security Security / Privacy

MTTD and MTTR: Two Metrics to Improve Your Cybersecurity

Threatpost

While there are dozens of metrics available to determine success, there are two key cybersecurity performance indicators every organization should monitor. Vulnerabilities Web Security Cybersecurity MTTD MTTR

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to Get the Most Out of Your Security Metrics

Dark Reading

There's an art to reporting security metrics so that they speak the language of leadership and connect the data from tools to business objectives

How will Cyber Essentials changes affect you?

IT Governance

In April, there will be a major change to the way the Cyber Essentials scheme is administered.

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

Are Companies Adhering to CCPA Requirements?

Data Breach Today

Sales 191

More Trending

GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime

The Last Watchdog

A cyber strategy is a documented approach to handling various aspects of cyberspace. It is mostly developed to address the cybersecurity needs of an entity by focusing on how data, networks, technical systems, and people are protected. An effective cyber strategy is normally on par with the cybersecurity risk exposure of an entity. It covers all possible attack landscapes that can be targeted by malicious parties.

Cloud 163

Customer Tracking at Ralphs Grocery Store

Schneier on Security

To comply with California's new data privacy law, companies that collect information on consumers and users are forced to be more transparent about it. Sometimes the results are creepy.

UK Approves 'Limited' Role for Huawei in 5G Networks

Data Breach Today

British Government Snubs Trump Administration's Request to Ban Chinese Firm's Equipment The United Kingdom will allow "limited" use of equipment from China's Huawei for the nation's emerging 5G networks. After the Tuesday announcement, the White House and some U.S.

Wawa Breach May Have Compromised More Than 30 Million Payment Cards

Krebs on Security

In late December 2019, fuel and convenience store chain Wawa Inc. said a nine-month-long breach of its payment card processing systems may have led to the theft of card data from customers who visited any of its 850 locations nationwide.

Sales 217

Top 10 industries for monetizing data: Is yours one of them?

Find out which industries, use cases, and business applications are the best opportunities for data monetization. Understand what data is being monetized, who wants it, and why. Use data you already own to create new revenue sources. Download the eBook today!

How to Keep Your Information Safe for Data Privacy Day 2020

Thales eSecurity

January 28, 2020 marks the 13th iteration of Data Privacy Day. An extension of the celebration for Data Protection Day in Europe, Data Privacy Day functions as the signature event of the National Cyber Security Centre’s ongoing education and awareness efforts surrounding online privacy.

U.S. Department of Interior Grounding All Drones

Schneier on Security

UN Kept Hacker Attacks Under Wraps

Data Breach Today

196
196

Iowa Prosecutors Drop Charges Against Men Hired to Test Their Security

Krebs on Security

On Sept.

Privacy without borders: Reality or Fantasy?

Imagine a world in which every country shared a vision and a common set of principles to protect and regulate the use of personal data. It would make international business far simpler, provide citizens in every country with the same privacy rights.

Fortinet removed hardcoded SSH keys and database backdoors from FortiSIEM

Security Affairs

The vendor Fortinet has finally released security patches to remove the hardcoded SSH keys in Fortinet SIEM appliances. Fortinet has finally released security updates to remove the hardcoded SSH keys in Fortinet SIEM appliances.

Modern Mass Surveillance: Identify, Correlate, Discriminate

Schneier on Security

Communities across the United States are starting to ban facial recognition technologies. In May of last year, San Francisco banned facial recognition; the neighboring city of Oakland soon followed, as did Somerville and Brookline in Massachusetts (a statewide ban may follow).

Interior Dept. Grounds Drones Over Cybersecurity Concerns

Data Breach Today

Department Says Several Concerns Must Be Addressed The U.S. Department of the Interior this week announced that it has temporarily grounded all drone operations, except for emergencies, citing concerns over national security and cybersecurity. The agency is joining the U.S.

Sprint Exposed Customer Support Site to Web

Krebs on Security

Fresh on the heels of a disclosure that Microsoft Corp. leaked internal customer support data to the Internet, mobile provider Sprint has addressed a mix-up in which posts to a private customer support community were exposed to the Web.

The Key to Strategic HR: Process Automation

Do you want to automate your HR processes, but don’t know where to start? In this eBook, PeopleDoc explores which processes benefit the most from automation, and how an HR Service Delivery platform can help get things off the ground.

NIST Tests Forensic Methods for Getting Data From Damaged Mobile Phones

Security Affairs

Crooks sometimes damage their mobile devices to destroy evidence, NIST tests forensic methods for getting data from damaged mobile phones. Criminals sometimes damage their mobile phones in an attempt to destroy evidence.

Collating Hacked Data Sets

Schneier on Security

Two Harvard undergraduates completed a project where they went out on the Dark Web and found a bunch of stolen datasets. Then they correlated all the information , and then combined it with additional, publicly available information. No surprise: the result was much more detailed and personal.

Fake Factory Experiment Illustrates Attackers' Tactics

Data Breach Today

194
194

Watch Out for Coronavirus Phishing Scams

WIRED Threat Level

At least one email campaign is preying on fears by claiming to offer info about the Wuhan coronavirus. Security Security / Cyberattacks and Hacks

Embedded BI and Analytics: Best Practices to Monetize Your Data

Speaker: Azmat Tanauli, Senior Director of Product Strategy at Birst

By creating innovative analytics products and expanding into new markets, more and more companies are discovering new potential revenue streams. Join Azmat Tanauli, Senior Director of Product Strategy at Birst, as he walks you through how data that you're likely already collecting can be transformed into revenue!

Attacks on Citrix servers increase after the release of CVE-2019-19781 exploits

Security Affairs

Citrix has released security patches for the recently disclosed CVE-2019-19781 flaw, but the number of attacks on vulnerable systems is increasing.

Risk 89

NSA Security Awareness Posters

Schneier on Security

From a FOIA request, over a hundred old NSA security awareness posters. Here are the BBC's favorites. Here are Motherboard's favorites. I have a related personal story.

Police Bust 3 Suspected Magecart Hackers in Indonesia

Data Breach Today

185
185

The DOJ Is Finally Suing US Telecom Providers for Robocalls

WIRED Threat Level

The defendants have allegedly connected hundreds of millions of fraudulent robocalls to US residents. Security Security / Security News

Report: Threat of Emotet and Ryuk

Security Affairs

Experts at cyber security firm Cypher conducted a study on Portuguese domains during 2019 and concluded that Emotet and Ryuk were the most active threats.