During a time where hospitals are already strapped for resources, Mercy Iowa City hospital reported that an internal email compromise and phishing email incident led to the exposure of personal information of some 60,473 individuals.
In today's ever changing environment, no organization and enterprise is immune from violence. Whether it is a church, movie theater, mall, or healthcare setting the need to plan for an act of violence, including active shooter events, is of paramount importance. And while public safety situational awareness and vigilance is an absolute must in our modern world, much thought has been given to how to develop plans, procedures, training and technology to stop these acts of violence. Here, we talk to Tim Sulzer, Chief Technology Officer (CTO) of ZeroEyes, about how physical security technology has evolved over the years to help make a difference in situations involving an active shooter or to reduce workplace and gun violence in various settings.
Interested in learning about the resources, tools, and grant opportunities offered by the Cybersecurity and Infrastructure Security Agency (CISA) to help improve school security and resiliency?
Join CISA's School Safety Task Force for a webinar on K-12 School Infrastructure Security Best Practices Webinar on Tuesday, November 24, 2020 at 3:00 pm - 3:45 pm EST in support of this year's Infrastructure Security Month.
According to Menlo Security, Google Chrome users don't always take time to relaunch browser updates, and some legacy applications don't support new versions of Chrome.
Menlo Labs discovered that there are 49 different versions of Chrome being used by their customers as of November 17. Nearly two-thirds (61 percent) are running the latest build (.86) while just over a quarter (28 percent) are running one version prior (.85). Out of the customers running .86, a staggering 83 percent are running versions of Chrome that are vulnerable (
The Standoff, an online offensive/defensive competition in which defenders (blue teams) compete against attackers (red teams) to control the infrastructure of a simulated digital city, has concluded.
The event took place Nov. 12-17, 2020, pitting information security veterans against skilled hackers in a battle to hack mock banks, utilities, airports, downtown hubs, IoT systems, cargo and public transportation, telecoms systems and more.
President Donald Trump announced late on Tuesday that he had "terminated" Christopher Krebs, who served as the first director of the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA). Trump claimed that Krebs' statement that the 2020 election was one of the most secure was "highly inaccurate."
Between distributed workforces and scattered schedules, there’s no doubt the work environment has faced enormous disruption over the past few months, forcing enterprises to modernize their security measures. The solution? Jason Soroko, Chief Technology Officer (CTO) at Sectigo, believes it's a Zero-Trust Security Strategy. Here we talk to Soroko about the importance of a zero-trust strategy, especially during the ongoing COVID-19 pandemic.
Unit 42 researchers discovered a class of Amazon Web Services (AWS) APIs that can be abused to leak the AWS Identity and Access Management (IAM) users and roles in arbitrary accounts.
How is the current COVID-19 pandemic affecting fraud levels, and what can firms do to protect their employees and customers? Below, we talk to Omri Kletter, VP, Cyber Crime and Fraud Management at Bottomline, about best practices for managing risk and cyber threats in the payments process more broadly.
Meet Stephanie Benoit-Kurtz, lead of cybersecurity faculty at the University of Phoenix – Las Vegas. She is also director of cybersecurity for Station Casinos in Las Vegas. She has spent three decades in the IT industry, working for a variety of large and small organizations and as a consultant. In the early days of her career, despite being part of the team responsible for implementing decisions at the IT company where she was employed, she “was routinely left out of the decision-making process. Here, we talk to Benoit-Kurtz about how the cybersecurity space has changed over time, and how the industry can embrace more individuals to meet demand and close the cybersecurity gap.