Mon.Sep 26, 2022

Assessing Growing Cyberthreats to Africa's Financial Sector

Data Breach Today

Rob Dartnall of Security Alliance Shares Insights on Current and Emerging Trends Financial services firms in Africa are becoming bigger cyber targets as they expand into new mobile payment and financial inclusion products.

GUEST ESSAY: The case for an identity-first approach ‘Zero Trust’ privileged access management

The Last Watchdog

Today’s enterprises are facing more complexities and challenges than ever before. Related: Replacing VPNs with ZTNA. Thanks to the emergence of today’s hybrid and multi-cloud environments and factors like remote work, ransomware attacks continue to permeate each industry.

Access 117

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Feds: Chinese Hacking Group Undeterred by Indictment

Data Breach Today

Indictment 'Did Not Hinder APT41’s Operations,' says HHS HC3 Two federal indictments against APT41, a Chinese state-sponsored hacking group, haven't slowed down its operations, the U.S. government acknowledges in a warning telling the healthcare sector to be vigilant about the threat actor.

The Best VPNs to Protect Yourself Online

WIRED Threat Level

It won’t solve all of your privacy problems, but a virtual private network can make you a less tempting target for hackers. Gear Gear / Buying Guides Gear / How To and Advice Security Security / Security Advice

The Top 5 Business Outcomes Companies Can Achieve From Monitoring Consolidation

In this eBook, learn what the top five business outcomes are that organizations see when leveraging Datadog's end-to-end monitoring tool.

Code42's Joe Payne on Why Source Code Theft Is So Prevalent

Data Breach Today

CEO Shares Strategies to Overcome Technical, Cultural Challenges of This Top Threat Too often when software developers change jobs, they take source code they've written with them, feeling the code belongs to them even if it belongs to an employer.

More Trending

OT Security Shorted by Nuclear Weapon Oversight Agency

Data Breach Today

National Nuclear Security Administration Made 'Limited Progress,' Says GAO The U.S. federal agency responsible for the ongoing functionality of the nuclear weapons stockpile hasn't gotten its arms around how to secure operational technology, says the Government Accountability Office.

China-linked TA413 group targets Tibetan entities with new backdoor

Security Affairs

China-linked cyberespionage group TA413 exploits employ a never-before-undetected backdoor called LOWZERO in attacks aimed at Tibetan entities.

LockBit Publishes Stolen Data as Hospital Rejects Extortion

Data Breach Today

French Government Vows Resistance, Stepped-Up Cybersecurity Funding Ransomware hackers made good on a threat to publish patient and staff data stolen from a French hospital after administrators said they refused on principal to pay out.

Metador, a never-before-seen APT targeted ISPs and telco for about 2 years

Security Affairs

A previously undetected hacking group, tracked as Metador, has been targeting telecommunications, internet services providers (ISPs), and universities for about two years.

Modernizing Workloads with the Cloud: How to Improve Performance & Reduce Costs

In this eBook, you’ll learn how to migrate workloads to Azure and optimize performance for your serverless and containerized applications in Azure.

Russia Planning Cyberattacks on Ukraine's Energy Grid

Dark Reading

Ukraine military intelligence says Russia is planning cyberattacks on the country's energy sector, as well as against allies including Poland and the Baltic states

Russia prepares massive cyberattacks on the critical infrastructure of Ukraine and its allies

Security Affairs

The Ukrainian military intelligence warns that Russia is planning to escalate cyberattacks targeting Ukraine and Western allies.

Should Hacking Have a Code of Conduct?

Dark Reading

For white hats who play by the rules, here are several ethical tenets to consider


This Vote Could Change the Course of Internet History

WIRED Threat Level

UN countries are preparing to pick a new head of the International Telecommunications Union. Who wins could shape the open web's future. Security Security / National Security Security / Privacy

Prioritizing Customer Experience Using SLIs & SLOs: A Case Study from The Telegraph

Service Level Indicators (SLIs) and Service Level Objectives (SLOs) are a key pillar of Site Reliability Engineering (SRE) and are the principal tool for eliminating needless alerts and focusing on what really matters to the business.

Cyber Threat Alliance Extends Membership to 6+ Leading Cybersecurity Companies

Dark Reading

CTA now has 36 members headquartered in 11 countries who follow cyber activities across the world, showing cybersecurity industry members realize the value in collaboration

Sentence in a Catphishing Case


A convict serving twenty-five years in South Carolina for voluntary manslaughter and attempted armed robbery, Darnell Kahn, has now also been convicted in a US court on Federal sextortion charges. Social Engineering Phishing Spear Phishing

We're Thinking About SaaS the Wrong Way

Dark Reading

Many enterprise applications are built outside of IT, but we still treat the platforms they're built with as point solutions

IT 60

Recent Optus Data Breach Teaches the Importance of Recognizing Social Engineering


Optus, one of Australia's largest telecommunications companies, recently suffered a data breach that affected over 9.8 million customers. Social Engineering Data Breach

Detect and Respond to Threats Across Your Applications, Networks, and Infrastructure

Understand how to solve cloud complexity challenges with threat detection tools, analyze security threats anywhere in your stack, and deploy turnkey detection rules mapped to the MITRE ATT&CK framework with Datadog Security Monitoring.

Despite Recession Jitters, M&A Dominates a Robust Cybersecurity Market

Dark Reading

Funding has been somewhat lower than last year, but investment remains healthy, analysts say, amid thirst for cloud security in particular

Cloud 60

Tracking engineering documents in capital projects

OpenText Information Management

In my last blog in this series on Engineering Document Management for capital projects I discussed the importance of a project workspace in achieving project success.

How Quantum Physics Leads to Decrypting Common Algorithms

Dark Reading

YouTuber minutephysics explains how Shor's algorithm builds on existing formulae like Euclid's algorithm and Fourier transforms to leverage quantum superpositioning and break encryption

 Transitioning to a sustainable energy future

OpenText Information Management

Around the world, energy costs are spiking to record-high prices and aren’t expected to subside anytime soon. In fact, according to the World Bank, the price of energy commodities is expected to be 46 percent higher on average in 2023.

Optimize the Performance of Your Serverless Functions

Run mission-critical applications on serverless without sacrificing visibility.

You Need Aggressive Cyber Training, Not "So, So" Training


According to nearly every study conducted over the last decade, social engineering is involved in the vast majority of cyber attacks. The figures range from about 30% to 90% of all hacking and malware attacks.

What CEOs really need from today’s CIOs via

IG Guru

In the data economy, corporations need CIOs who can get out of delivery and into redesigning their businesses for the future. Business IG News CEO CIO Data Economy Information Economics


Creating a holistic 360-degree “citizen” view with data and AI

IBM Big Data Hub

Achieving health equity is perhaps the greatest challenge facing US public health officials today. In a 2021 report released by the Commonwealth Fund, the nation ranked last among high-income countries in access to healthcare and equity, despite spending a far greater share of its GDP on healthcare.

Build and Sustain Your Records Program with a Records Management Playbook

ARMA International

What if your organization’s entire records team won the lottery today and quit? What would happen to your records program? How long would it take your organization to rebuild the team from scratch? If you had a records management playbook in place, your newly hired team could hit the ground running!

The 5 Stages of Account-Based Marketing — and How to Win Them All

Successfully complete the five stages of ABM: define, identify, engage, convert, and connect. We’ll show you how to create a unified system with your sales team to help them land more qualified opportunities and connect with prospects like never before.

Is your conversational AI setting the right tone?

IBM Big Data Hub

Conversational AI is too artificial. Nothing is more frustrating than calling a customer support line to be greeted by a monotone, robotic, automated voice. The voice on the other end of the phone is taking painfully long to read you the menu options.

TikTok could face £27m fine for failing to protect children’s privacy

The Guardian Data Protection

Investigation finds video-sharing app may have breached UK data protection law between 2018 and 2020 TikTok is facing the prospect of a £27m fine for failing to protect the privacy of children, the UK’s data watchdog has said.

Samsung Fails Consumers in Preventable Back-to-Back Data Breaches, According to Federal Lawsuit

Dark Reading

Company unnecessarily collected consumers' personal data and failed to safeguard it, suit alleges, leading to two back-to-back data breaches