With many countries opening up for tourists, the airline industry is seeing a rise in fraudulent credit card transactions, says Johan Waldeck, senior forensic investigator at Comair Limited, a leading South African airline company.
They are high-profile, they have access to your company's most vital information, they rely on unsecured personal devices - and your cyber adversaries are targeting them. They are your board members, and Chris Pierson of BlackCloak has ideas on where and how you can better secure these leaders.
The Israeli government paid a visit on Wednesday to NSO Group, the company whose spyware is alleged to have been covertly installed on the mobile devices of journalists and activists. The visit comes as Israel faces growing pressure to see if NSO Group's spyware, called Pegasus, has been misused.
Calls are growing for an investigation into how commercial Pegasus spyware developed by Israel's NSO Group gets sold to autocratic governments and used to target journalists, lawyers, human rights advocates and others, with some lawmakers saying "the hacking-for-hire industry must be brought under control."
Organizations of all sizes struggle to manage endpoints that need access to corporate applications and data. They often have limited visibility into their fleets of devices. Additionally, policy enforcement is complex and achieving regulatory compliance can be a headache. In this guide, you’ll learn about the...
Zero trust has become a dominant security model for the changes brought by mobility, consumerization of IT and cloud applications. And while the term zero trust continues to infiltrate IT security conversations, it raises an important question: how do we get there?
In this guide, we examine the three pillars of zero...
With all the talk of sophisticated adversaries and evolving threats to users and devices – what about threats to building management systems? Jeremy Morgan of Industrial Defender discusses this threat landscape and the role of automated tools to defend it.
Morgan, a principal risk and solutions consultant, says...
Endpoint Detection and Response (EDR) tools enable organizations to address the increased complexity and frequency of attacks by providing unparalleled visibility and detection across their endpoints.
Red Canary’s technical team keeps constant tabs on the EDR market, evaluates new technology, and has guided...
How much trust can you put in your devices?
Security concepts like Zero Trust can provide an essential framework for securing the remote work environment and your supply chain from attackers.
Download this guide from Eclypsium to learn:
How attackers capitalize on blind spots in device security
Why device...
The security landscape continues to evolve with the rise of the “cyber mafia,” which is increasingly focusing cyber attacks on larger, corporate-level targets. Now is the time for developers to embrace the need for security.
This whitepaper explores how these cyber attacks on IoT devices have changed and the...
With all the talk of sophisticated adversaries and evolving threats to users and devices – what about threats to building management systems? Jeremy Morgan of Industrial Defender discusses this threat landscape and the role of automated tools to defend it.
Managed Service Providers (MSPs) are an important part of the IT environment, providing the knowledge and the trusted partnerships
that enable organizations of all sizes to embrace innovations made available by our era of digital transformation.
While there has never been a more exciting time to be an MSP, there...
A Swiss national who recently highlighted flaws in Verkada surveillance cameras has been charged with criminal hacking by a U.S. federal grand jury and accused of illegally accessing and leaking data from numerous organizations, apparently including Intel, Nissan and the U.S. National Reconnaissance Office.
In the new EMA research report, Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network Segmentation, the analyst Shamus McGillicuddy explores how network-based technology is the foundation of Zero Trust.
Shamus highlights that the Zero Trust model is a continuous cycle of establishing a...
Two vulnerabilities in Tesla's keyless entry system allowed researchers to clone a key fob and drive away with a Model X. The electric vehicle manufacturer is issuing over-the-air updates to fix the flaws, which allegedly center on a failure to validate firmware updates and a faulty Bluetooth pairing protocol.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.