Sat.Jan 25, 2020 - Fri.Jan 31, 2020

The Fractured Future of Browser Privacy

WIRED Threat Level

Better anti-tracking measures have become the norm for Chrome, Firefox, Safari, and other modern browsers. But they still disagree on how exactly they should work. Security Security / Privacy

MTTD and MTTR: Two Metrics to Improve Your Cybersecurity


While there are dozens of metrics available to determine success, there are two key cybersecurity performance indicators every organization should monitor. Vulnerabilities Web Security Cybersecurity MTTD MTTR

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to Get the Most Out of Your Security Metrics

Dark Reading

There's an art to reporting security metrics so that they speak the language of leadership and connect the data from tools to business objectives

How will Cyber Essentials changes affect you?

IT Governance

In April, there will be a major change to the way the Cyber Essentials scheme is administered.

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Are Companies Adhering to CCPA Requirements?

Data Breach Today

Some Are Not Giving Customers Option to Opt out of Data Sale, Legal Experts Say Many companies that should be offering customers the ability to "opt out" of the sale of their information under the California Consumer Privacy Act are failing to do so because of the law's ambiguities, some legal experts say. CCPA went into effect Jan.

Sales 204

More Trending

GUEST ESSAY: Strategic tactics are key to a robust Cloud Security Posture Management regime

The Last Watchdog

A cyber strategy is a documented approach to handling various aspects of cyberspace. It is mostly developed to address the cybersecurity needs of an entity by focusing on how data, networks, technical systems, and people are protected. An effective cyber strategy is normally on par with the cybersecurity risk exposure of an entity. It covers all possible attack landscapes that can be targeted by malicious parties.

Cloud 165

How to Keep Your Information Safe for Data Privacy Day 2020

Thales eSecurity

January 28, 2020 marks the 13th iteration of Data Privacy Day. An extension of the celebration for Data Protection Day in Europe, Data Privacy Day functions as the signature event of the National Cyber Security Centre’s ongoing education and awareness efforts surrounding online privacy.

Wawa's Stolen Payment Cards Are Now for Sale

Data Breach Today

Fraud Marketplace Joker's Stash Says it Has 30 Million Cards A long-running marketplace for selling stolen payment card data claims it has 30 million stolen payment cards that experts believe are linked to the breach at Wawa convenience stores late last year.

Sales 230

Wawa Breach May Have Compromised More Than 30 Million Payment Cards

Krebs on Security

In late December 2019, fuel and convenience store chain Wawa Inc. said a nine-month-long breach of its payment card processing systems may have led to the theft of card data from customers who visited any of its 850 locations nationwide.

Sales 221

Future-Proofing Your Information Governance Strategy

Speaker: Crystal Cao, Lindsey Simon & Lisa Ripley

Join Onna and experts from Quip, Airbnb, and Oracle for this live webinar as they dive into proactive data deletion policies, retention strategies, and legal hold practices that are essential to a modern enterprise information governance strategy.

What’s the Current State of Data Governance and Automation?


I’m excited to share the results of our new study with Dataversity that examines how data governance attitudes and practices continue to evolve. Defining Data Governance: What Is Data Governance? .

For the second time in a few days, Greek Government websites hit by DDoS attacks

Security Affairs

The Greek government announced that a DDoS cyber attack hit the official state websites of the prime minister, the national police and fire service and several important ministries.

Ryuk and Sodinokibi Surge as Ransom Payments Double

Data Breach Today

More Sophisticated Gangs Increasingly Target Large Enterprises, Coveware Warns Bad news on the ransomware front: Victims that choose to pay attackers' ransom demands - in return for the promise of a decryption tool - last quarter paid an average of $84,116, according to Coveware.

Sprint Exposed Customer Support Site to Web

Krebs on Security

Fresh on the heels of a disclosure that Microsoft Corp. leaked internal customer support data to the Internet, mobile provider Sprint has addressed a mix-up in which posts to a private customer support community were exposed to the Web.

The North Star Playbook

Every product needs a North Star. In this guide, we will show you the metrics product managers need to tie product improvements to revenue impact. If you are looking for a more-focused, less-reactive way to work, this guide is for you.

Watch Out for Coronavirus Phishing Scams

WIRED Threat Level

At least one email campaign is preying on fears by claiming to offer info about the Wuhan coronavirus. Security Security / Cyberattacks and Hacks

Chinese hackers exploited a Trend Micro antivirus zero-day used in Mitsubishi Electric hack

Security Affairs

Chinese hackers have exploited a zero-day vulnerability the Trend Micro OfficeScan antivirus in the recently disclosed hack of Mitsubishi Electric.

Police Bust 3 Suspected Magecart Hackers in Indonesia

Data Breach Today


Modern Mass Surveillance: Identify, Correlate, Discriminate

Schneier on Security

Communities across the United States are starting to ban facial recognition technologies. In May of last year, San Francisco banned facial recognition; the neighboring city of Oakland soon followed, as did Somerville and Brookline in Massachusetts (a statewide ban may follow).

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Greater Focus on Privacy Pays Off for Firms

Dark Reading

Privacy-mature companies complete sales more quickly, have fewer and less serious breaches, and recover from incidents faster, according to Cisco's annual survey

Sales 106

NIST Tests Forensic Methods for Getting Data From Damaged Mobile Phones

Security Affairs

Crooks sometimes damage their mobile devices to destroy evidence, NIST tests forensic methods for getting data from damaged mobile phones. Criminals sometimes damage their mobile phones in an attempt to destroy evidence.

Fake Factory Experiment Illustrates Attackers' Tactics

Data Breach Today

Trend Micro Project Demonstrates Targeting of Industrial Control Systems Trend Micro researchers created a phony "smart factory" that lured attackers, demonstrating how they are increasingly focusing on industrial control systems and have become adept at planting malware within vulnerable infrastructure.


The Sneaky Simple Malware That Hits Millions of Macs

WIRED Threat Level

How the Shlayer Trojan topped the macOS malware charts—despite its “rather ordinary” methods. Security Security / Cyberattacks and Hacks

IT 106

Pressure Points: How to Ensure Your B2B Pipeline Passes Inspection

This eBook highlights best practices for developing a pipeline management process that helps sales leaders and their team C.L.O.S.E (you’ll see what we mean in this eBook) more revenue through data-driven prospecting, stage analysis, and subsequent sales enablement.

Collating Hacked Data Sets

Schneier on Security

Two Harvard undergraduates completed a project where they went out on the Dark Web and found a bunch of stolen datasets. Then they correlated all the information , and then combined it with additional, publicly available information. No surprise: the result was much more detailed and personal.

Cisco Webex flaw allows unauthenticated remote attackers to join private meetings

Security Affairs

Cisco addressed a vulnerability in Cisco Webex that could be exploited by a remote, unauthenticated attacker to join a protected video conference meeting.

Fake Coronavirus Messages Spreading Emotet Infections

Data Breach Today

Reports: Cybercriminals Using Health Emergency Messages to Spread Malware Cybercriminals are using fake email messages about the coronavirus to spead the Emotet Trojan and other malware, according to reports released this week by IBM and Kaspersky


Scraping the Web Is a Powerful Tool. Clearview AI Abused It

WIRED Threat Level

The facial recognition startup claims it collected billions of photos from sites like Facebook and Twitter. What does the practice mean for the open web? Security Security / Privacy

IT 93

Marketing-Led Post-COVID-19 Growth Strategies

Businesses are laying off workers, shutting their doors (some permanently), and struggling to react to the radical destruction that coronavirus (COVID-19) is doing to our society and communities. Most have already sustained massive damage, and we still have yet to see the scope of impact of the global pandemic that has upended the globe. Any return to normalcy may seem far-off, but sales and marketing are on the front lines of restarting the economy. When the dust settles, we have a responsibility to turn our shock and grief into fierce determination, and lead the charge of responsible, strategic, sustainable future growth. However, there’s no team better suited to lead that charge than the marketing department. Marketers are uniquely positioned to provide creative solutions to aid their organization in times of change and chart a course for navigating success.

Customer Tracking at Ralphs Grocery Store

Schneier on Security

To comply with California's new data privacy law, companies that collect information on consumers and users are forced to be more transparent about it. Sometimes the results are creepy.

Fortinet removed hardcoded SSH keys and database backdoors from FortiSIEM

Security Affairs

The vendor Fortinet has finally released security patches to remove the hardcoded SSH keys in Fortinet SIEM appliances. Fortinet has finally released security updates to remove the hardcoded SSH keys in Fortinet SIEM appliances.

Interior Dept. Grounds Drones Over Cybersecurity Concerns

Data Breach Today

Department Says Several Concerns Must Be Addressed The U.S. Department of the Interior this week announced that it has temporarily grounded all drone operations, except for emergencies, citing concerns over national security and cybersecurity. The agency is joining the U.S.