Day: August 1, 2022

Check Point Execs: Supply Chain Woes Will Persist Into 2023

Check Point Beats Q2 Earnings Forecast Despite Spike in Materials, Shipping Costs Michael Novinson (MichaelNovinson) • August 1, 2022     Check Point founder and CEO Gil Shwed (Image: Check Point) Israeli cybersecurity company Check Point anticipates little relief from supply chain pressure as it experiences a spike in the cost of making and shipping …

Check Point Execs: Supply Chain Woes Will Persist Into 2023 Read More »

Two Vendor Hacks Affect Nearly 1.5 Million and Counting

3rd Party Risk Management , Governance & Risk Management , HIPAA/HITECH The Business Associates Also List Dozens of Affected Covered Entity Clients Marianne Kolbasuk McGee (HealthInfoSec) • August 1, 2022     Two hacking incidents involving vendors providing IT-related and other services to dozens of covered entity clients demonstrate how mounting reliance on third parties …

Two Vendor Hacks Affect Nearly 1.5 Million and Counting Read More »

Resecurity partners with CFBD to mitigate risk for Peruvian enterprises

Resecurity partners with CFBD to expand Resecurity’s AI-driven cybersecurity solutions and services to Peru. As Peru’s digital economy expands, cyber threats are increasingly prominent, with 32% of organizations in Peru suffering cyber-attacks from 2018-2020. Compounding these threats, Peru’s organizations face the challenges of limited security talent, early-stage digitalism, and access to cybersecurity solutions that help …

Resecurity partners with CFBD to mitigate risk for Peruvian enterprises Read More »

Draft Bill: American Data Privacy and Protection Act

Originally published by BigID here. Written by Jaclyn Wishnia, BigID. A draft of a bipartisan federal comprehensive privacy bill was published on Friday, June 3rd. The proposed bill — entitled the “American Data Privacy and Protection Act”— would “provide consumers with foundational privacy rights, create strong oversight mechanisms, and establish meaningful enforcement.” The proposed bill …

Draft Bill: American Data Privacy and Protection Act Read More »

The New Kubernetes Gateway API and Its Use Cases

Originally published by ARMO here. Written by Leonid Sandler, CTO & Co-founder, ARMO. Despite being a large open-source and complex project, Kubernetes keeps on evolving at an impressive pace. Being at the center of various platforms and solutions, the biggest challenge for the Kubernetes project is to remain vendor-neutral. This is the reason the community …

The New Kubernetes Gateway API and Its Use Cases Read More »

Meta, FTC Must Work Together To Clarify Market, Judge Says

By Hailey Konnath (August 1, 2022, 10:40 PM EDT) — A D.C. federal judge on Monday ordered Meta Platforms Inc. to give the U.S. Federal Trade Commission certain information on Facebook, Instagram, WhatsApp and Facebook Messenger features that should be considered “personal social networking,” while also ordering the FTC to clarify whether those features are …

Meta, FTC Must Work Together To Clarify Market, Judge Says Read More »

Steve Benton joins Anomali as Vice President and General Manager

Anomali names Steve Benton to the position of Vice President of Anomali Threat Research (ATR) and General Manager of the Anomali Belfast, Ireland Office. Benton, an experienced cyber security expert has a history of strategic advisory, intelligence sharing and coordinated response across MD, CxO, and board audiences. Benton joins Anomali to deliver guidance to global …

Steve Benton joins Anomali as Vice President and General Manager Read More »

Ransomware Incidents in Government, Healthcare & Schools Down in 2022

It certainly feels as though every report or research on cybersecurity and cybercrime discusses the rising number of attacks and risks associated with that. But what you might not know is that ransomware attacks specifically targeting public organizations such as local government, schools, and hospitals have actually decreased in 2022. According to a report from …

Ransomware Incidents in Government, Healthcare & Schools Down in 2022 Read More »

This is how they use Windows Defender antivirus to encrypt your computer with LockBit Ransomware

Hackers are constantly looking for new ways to attack and infect PC users. And, for this, there is nothing better than taking advantage of the programs or services that are installed as standard in the operating system, such as Windows Defender, the most widely used antivirus today. In this way, a group of hackers has …

This is how they use Windows Defender antivirus to encrypt your computer with LockBit Ransomware Read More »

LogicMonitor appoints Ryan Worobel as CIO

LogicMonitor announced the appointment of Ryan Worobel as Chief Information Officer (CIO). As CIO, Worobel will be responsible for LogicMonitor’s product, network and application infrastructure, working to further simplify and streamline the business to support LogicMonitor’s growth ambitions. As enterprises today are increasingly digital, Worobel will be tasked to ensure that LogicMonitor and its customers’ …

LogicMonitor appoints Ryan Worobel as CIO Read More »

TikTok starts HTML5 gaming pilot program

TikTok users in some countries, including the US, can now upload videos containing links to a small selection of HTML5-based mini-games. The new feature is a test to see if games could become the next magnet for engagement on the platform.Read more

Beware of Third-Party Trackers Like Meta Pixel. Ignoring Them Could Be Costly.

Odia Kagan of FoxRothschild offers some concise and sage advice: If you are dealing with sensitive information of any kind (yes, this includes precise geolocation, ethnicity, sexual orientation, etc), but especially health information (and yes, reproductive health information too), do yourself a favor: Scan your website for third party trackers like Meta Pixel. Talk to …

Beware of Third-Party Trackers Like Meta Pixel. Ignoring Them Could Be Costly. Read More »

Tracking Ransomware: Here's Everything We Still Don’t Know

Known Unknowns Include Count of Victims and Ransoms Paid, Criminal Profits and More Mathew J. Schwartz (euroinfosec) • August 1, 2022     Photo: Colin Kinner (via Flickr/CC; adapted) How many organizations fall victim to a ransomware outbreak? How many victims pay a ransom? How many victims see stolen data get leaked? How are attackers …

Tracking Ransomware: Here's Everything We Still Don’t Know Read More »

Keep Austin Wired: These 7 Tech Companies Are Hiring

In the city legendary for its South by Southwest festival, seven Austin companies are riding the wave of tech innovation, expanding quickly and hiring across departments.  Austin’s emergence as a booming center for tech startups is a more recent development in the area already known for its live music, artistic culture, Tex-Mex cuisine and beautiful …

Keep Austin Wired: These 7 Tech Companies Are Hiring Read More »

Two Vendor Hacks Affect Nearly 400,000 and Counting

3rd Party Risk Management , Governance & Risk Management , HIPAA/HITECH The Business Associates Also List Dozens of Affected Covered Entity Clients Marianne Kolbasuk McGee (HealthInfoSec) • August 1, 2022     Two hacking incidents involving vendors providing IT-related and other services to dozens of covered entity clients demonstrate how mounting reliance on third parties …

Two Vendor Hacks Affect Nearly 400,000 and Counting Read More »

Getting a business grip on security frameworks

Getting a business grip on security frameworks | CIO Skip to content iStock/gorodenkoff Trying to explain secure access service edge (SASE pronounced ‘sassy’) and zero trust can be exasperating when you’re making the case for business leaders to invest in new products and infrastructure. The onus is on IT leaders to focus top executives on …

Getting a business grip on security frameworks Read More »

US introduces new restrictions for exports of chipmaking tools to China

Most analysts expect China’s leading tech companies will soon post their worst-ever quarterly results after being hammered by regulatory crackdowns and lockdown-related factory output issues. While this will make it harder for the country to weather the economic storm, the Chinese government’s plan for technological self-sufficiency has a more pressing…Read more