While it is likely that the breach activity of 2018 won’t reach the level of 2017, a look back at the first nine months suggests that 2018 is on pace to be another significant year for breaches, according to Risk Based Security. The 2018 Q3 Data Breach QuickView Report found that 3,676 data compromise events were disclosed between 1 January and 30 September, exposing 3.6 billion records. However high those numbers might seem, and despite the consistent pace at which disclosures are reporte...
INFOSECURITY MAGAZINE
READ MORE
|
A new study by Max Kilger, director of Data Analytics Programs at The University of Texas at San Antonio (UTSA) College of Business, is delving into an aspect of cybersecurity rarely explored before now: the human component. Kilger's research utilizes his talents as a social psychologist to show that at the beginning of any digital threat is a real person with unique motivations....
SCIENCE DAILY
READ MORE
|
Tenable Network Security Inc. has tapped the head of a Dell Technologies cybersecurity unit to serve as its chairman and CEO.Amit Yoran will take the helm at the fast-growing Columbia cybersecurity company Jan. 3. He replaces Tenable co-founder and CEO Ron Gula, who announced in June he was stepping down after 14 years....
BALTIMORESUN.COM
READ MORE
|
The employees at Black Hills Information Security get paid to break into companies for a living; their focus on security and penetration testing and validation of security controls involves cyber activities such as phishing and hacking, as well as a little old-fashioned casing-the-joint type of work. Jordan Drysdale, Systems Administrator and Tester, calls it "Mission: Implausible.""The number one question we get asked is, why would anybody want us to break into their organization...
RAPID CITY JOURNAL
READ MORE
|
REVBITS CYBERSECURITY SOLUTIONS, provider of a comprehensive suite of security solutions, announced today that it has been named one of the top 100 cybersecurity startups for 2020. RevBits prevailed against many strong cybersecurity startups for this prestigious award. Cyber Defense Magazine searched around the world and found over 3,200 cybersecurity companies, nearly 30% of which were founded or launched their first innovative cybersecurity products and services within the last 36 months....
PRNEWSWIRE
READ MORE
|
Malware authors are using a new technique to keep their communications covert and evade detection: abusing the DNS protocol. According to Fidelis Security, DNS command and control (C&C) and DNS exfiltration can be successful because DNS is an integral part of the internet's infrastructure. Most traffic analyzers don’t look at how the DNS protocol itself is being used, which provides an opportunity for a victim machine to communicate with the bad actor’s C&C server, often ...
INFOSECURITY-MAGAZINE
READ MORE
|