As I mentioned in my past RSA reflection posts, I like the conference a lot — contrary to some of my industry peers — because I consider it to be “an industry in a room” event. This makes it ideal to quickly soak up what is going on. So, yes, it may be an imperfect mirror of our industry, but a mirror nonetheless.
Managed Detection and Response (MDR) Service Market Global Growth Opportunities, Demand, Segmentation, Revenues, … Arctic Wolf Networks
First, the release of our SaaS-based product Red Cloak Threat Detection in Response or TDR and our Managed Detection & Response or MDR service …
StockX, the high-flying resale marketplace that connects buyers and sellers of sneakers, streetwear, handbags and other collectible items who agree on pricing, has seen its fortune rise along with the $6 billion global sneaker resale market, which is part of the broader $100 billion sneaker category. In fact, the company, which was assigned a billion-dollar-plus valuation last year, says $1 billion worth of merchandise was sold through its platform last year.
“We’ve already stopped any centralized April Fool’s efforts but realize there may be smaller projects within teams that we don’t know about,” the email from Google’s head of marketing Lorraine Twohill continues. “Please suss out those efforts and make sure your teams pause on any jokes they may have planned — internally or externally.” Hopefully other companies will take note of Google’s lead here and adjust their own April Fools’ plans accordingly. There’s a time and a place for a good joke — but this probably isn’t it.
Politico asked 34 “macro thinkers” to share some of their thoughts on what the world will look like after we crawl from the wreckage of this thing. Some are hopeful, optimistic. Some, not so much. Definitely good food for thought. Here are a few excerpts.
Modern vehicles have up to 50 different automotive IoT devices (computers)
hackers can attack. That’s why vehicle cybersecurity is critical for automobile
Modern cars have dozens of computers on board, and they’re
not just for running GPS or playing music. Computers monitor and control nearly
every system on your vehicle, including steering, brakes, and the engine
itself. This is why automotive cyber security is essential.
Cybersecurity researchers with Qihoo 360’s NetLab today unveiled details of two recently spotted zero-day cyberattack campaigns in the wild targeting enterprise-grade networking devices manufactured by Taiwan-based DrayTek.
Written by Sean Lyngaas
While hackers all over the world rely on emails and text messages to breach networks, one infamous criminal group appears to be turning to the mailman to deliver their malicious code.
The House of Representatives just passed the CARES Act, a $2 trillion coronavirus/COVID-19 stimulus and relief bill, by voice vote. It’s now headed to the White House for impeached president Donald Trump’s signature.
French startup Zyl has released a major update of its mobile app for iOS and Android. The app is all about finding long-forgotten memories of important life events in your photo library.
In the U.S and global communities, election security is a large concern because so many aspects of it can be insecure and open to attacks that may shift public opinion or be used for personal gain. Not only does the complexity of the U.S. government raise concerns about security, campaigns also have weak points that make it a target for attacks.
The rapid acceleration from on-location to remote workforce as part of the Coronavirus Pandemic response opened the door to malicious actors accelerating their phishing and social engineering attacks. Cybercriminals prey on user anxiety by embedding malicious files in COVID-19 themed emails. Remote work layered with user anxiety increases credential theft attack success rates, leaving organizations’ mission-critical applications and data at risk.
As part of its response to the public health emergency triggered by the COVID-19 pandemic, the European Commission has been leaning on Europe’s telcos to share aggregate location data on their users.
Driving digital transformation initiatives while safeguarding the enterprise is a mammoth task. In some aspects, it might even sound counter-intuitive when it comes to opening up IT infrastructure, or converging IT and OT networks to allow external parties such as partners and customers to closely interact with the organization to embrace new business models and collaboration (think cloud applications, APIs, sensors, mobile devices, etc.).
In January of this year, experts detected a large-scale watering-hole attack aimed at residents of Hong Kong, in which the multifunctional malware LightSpy for iOS was installed on victims’ smartphones. This is yet another reminder to anyone who thinks that Apple devices, in particular iPhones, are immune to malware; they are protected, of course, but by no means totally.
KnowBe4’s new Phishing by Industry Benchmarking Report, published this week, reveals organisation’s Phish-Prone percentage (PPP), which indicates how many of their employees are likely to fall for a phishing or social engineering scam.
If a layman pictures a cyberattack, the likelihood is they picture a ransomware attack: The screens overcome by a malicious message, locking up systems and demanding payment to a shadowy organisation or individual.
A notorious ransomware gang claims to have successfully compromised the infrastructure… of a company selling cyberinsurance.