logoSign upLog in
Cybersecurity - beBee

Cybersecurity

7K buzzes
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.
Buzzes
  1. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    On Metrics: Responding to Failing Security Grades
    www.govtech.com A 2017 State of Cybersecurity Metrics Annual Report was recently released by Thycotic, and this new survey provides excellent insights into a disturbing lack of cybersecurity metrics worldwide. Most organizations are failing at cybersecurity...
    Relevant
  2. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    USB Devices Vulnerable to Crosstalk Data Leaks
    www.bleepingcomputer.com Just like water leaks from pipes, so do electric signals from USB ports, indirectly exposing sensitive data to a knowledgeable attacker, according to new research from scientists at the University of Adelaide in...
    Relevant
  3. Jaime Contreras, MBA, CISM, CISA
    #Ransomware
    Jaime Contreras, MBA, CISM, CISA
    The Week in Ransomware - August 11th 2017 - GlobeImposter & CryptoMix
    www.bleepingcomputer.com This week has been dominated by GlobeImposter releases that do not seem to stop. We also have a few CryptoMix variants and smaller ransomware variants. Otherwise, no big news released this week, which is always a good...
    Relevant
  4. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    The Key to Cybersecurity? Level Up on Resistance
    www.govtech.com Businesses need to put up as much resistance as possible, so the cybercriminals look...
    Relevant
  5. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    Could the security industry have it all wrong?
    www.csoonline.com Shifting focus from perimeters to people is crucial for success in the new era of mobility and...
    Relevant
  6. Jaime Contreras, MBA, CISM, CISA
    #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    How Cybersecurity Became 2017’s Hot New Major | Village Voice
    www.villagevoice.com Everybody wants to teach, but nobody can decide what it...
    Relevant
  7. Jaime Contreras, MBA, CISM, CISA
    #SmartCars
    Jaime Contreras, MBA, CISM, CISA
    You Can Trick Self-Driving Cars by Defacing Street Signs
    www.bleepingcomputer.com A team of eight researchers has discovered that by altering street signs, an adversary could confuse self-driving cars and cause their machine-learning systems to misclassify signs and take wrong decisions, potentially putting the lives of...
    Relevant
  8. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    HBO hack: Here are some expert theories on how and why it happened
    www.ibtimes.co.uk Despite recent comparisons, some experts say that the HBO hack may not be worse than the Sony...
    Relevant
  9. Jaime Contreras, MBA, CISM, CISA
    #Phishing, #Chrome
    Jaime Contreras, MBA, CISM, CISA
    Another popular Chrome extension hijacked through phishing - Help Net Security
    www.helpnetsecurity.com Chris Pederick is the latest victim of attackers who hijack popular Chrome add-ons in order to push (potentially malicious) ads onto...
    Relevant
  10. Jaime Contreras, MBA, CISM, CISA
    #Malware
    Jaime Contreras, MBA, CISM, CISA
    SSL encrypted malware doubles this year, phishing over SSL/TLS up 400%
    www.scmagazine.com Increasingly sophisticated malware strains are using SSL to encrypt their activity with malicious SSL-encrypted content more than...
    Relevant
  11. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    FireEye's Post Mortem: Analyst Didn't Change Passwords
    www.bankinfosecurity.com It’s a red-faced moment for FireEye. The company says an investigation reveals that an attack against an analyst’s personal online accounts was enabled by...
    Relevant
  12. John Enright

    John Enright

    08/08/2017
    John Enright
    Three-quarters of firms upped cybersecurity after WannaCry
    irishtechnews.ie DataSolutions today announced the results of a survey, which found that 73% of companies have made changes to their IT security as a direct result of the WannaCry ransomware...
    Relevant
  13. Jaime Contreras, MBA, CISM, CISA
    #Agile, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    How to Build a Strong, Agile Internal Security Team
    www.careersinfosecurity.com It's tough to find the right cybersecurity professionals to hire. Ben Chung, CISO at NTT Communications ICT Solutions, a global IT provider, describes how...
    Relevant
  14. Jaime Contreras, MBA, CISM, CISA
    #BreachNews
    Jaime Contreras, MBA, CISM, CISA
    FireEye Confirms Details of Two Customers were Exposed
    www.infosecurity-magazine.com FireEye has confirmed that business documents related to two separate customers in Israel have been...
    Relevant
  15. Jaime Contreras, MBA, CISM, CISA
    #InfoSec, #Malware
    Jaime Contreras, MBA, CISM, CISA
    FBI Arrests Marcus Hutchins, Who Stopped WannaCry
    www.bankinfosecurity.com British national Marcus Hutchins, aka "MalwareTech," has been arrested by the FBI on charges relating to the distribution of the Kronos banking...
    Relevant
  16. Jaime Contreras, MBA, CISM, CISA
    #Malware, #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    HawkEye malware: Hackers using 'versatile' data-stealing Trojan in multiple new phishing attacks
    www.ibtimes.co.uk Security experts have seen HawkEye infecting various global organisations across multiple...
    Relevant
  17. Jaime Contreras, MBA, CISM, CISA
    #HealthIT, #CyberSec
    Jaime Contreras, MBA, CISM, CISA
    Healthcare executives are investing heavily in cybersecurity technology but analysts worry that approach is shortsighted | FierceHealthcare
    www.fiercehealthcare.com Facing a growing number of cybersecurity threats, payer and provider executives are countering by boosting investments in software, firewalls and encryption. But a new survey also shows staffing is a low priority, leaving analysts wondering if the...
    Relevant
  18. Jaime Contreras, MBA, CISM, CISA
    #SocialMedia
    Jaime Contreras, MBA, CISM, CISA
    Iranian hackers used female 'honey pot' on social media to lure targets, finds new research
    www.independent.co.uk Hackers believed to be working for the Iranian government have impersonated a young female photographer on social media for more than a year, luring men working in industries strategically important to Tehran's regional adversaries, according to new...
    Relevant
  19. John Enright

    John Enright

    30/07/2017
    John Enright
    Hybrid cloud security: 8 key considerations
    enterprisersproject.com Expert advice on hybrid cloud security...
    Relevant
  20. John Enright

    John Enright

    29/07/2017
    John Enright
    Google Adds Verification Screens for Plugins Following Phishing Attacks
    securityintelligence.com Google is rolling out a number of protections to combat phishing attacks through plug-ins. These verification steps will help users practice due...
    Relevant
  21. John Enright

    John Enright

    29/07/2017
    John Enright
    fortune.com SEC needs to improve the way it protects its own computer networks from cyber attacks, according to a new GAO...
    Relevant
  22. John Enright

    John Enright

    28/07/2017
    John Enright
    Report: The top 5 cybersecurity threats of 2017
    www.techrepublic.com A report from Accenture has examined key threats that have emerged in the first half of 2017. Here's how businesses can stay...
    Relevant
  23. John Enright

    John Enright

    28/07/2017
    John Enright
    3 New CIA-developed Hacking Tools For MacOS & Linux Exposed
    thehackernews.com Wikileaks has exposed Achilles backdoor, SeaPea Rootkit for Apple Mac OS and Aeris Linux hacking tools developed by the...
    Relevant
  24. Jaime Contreras, MBA, CISM, CISA
    #InfoSec
    Jaime Contreras, MBA, CISM, CISA
    10 old-school IT principles that still rule
    www.cio.com Technology changes rapidly, but beneath the buzzwords, the fundamentals of sound IT strategy remain. Here are 10 graybeard IT tenets that still reign — when applied in their modernized...
    Relevant
  25. John Enright

    John Enright

    27/07/2017
    John Enright
    Ransomware goes pro: How crooks are getting into customer service
    www.cnet.com The operators are acting like legitimate firms, offering support services and even hiring graphic...
    Relevant
See all