November 9, 2022

Data Theorem and AlphaSOC join forces to protect customers against data exfiltration

Data Theorem and AlphaSOC announced their new partnership to deliver cloud extended detection and response (XDR) with cloud infrastructure entitlement management (CIEM) features to address customer challenges around attack surface management of their cloud-native applications. This partnership introduces combined Cloud XDR and CIEM for proactive attack surface management delivered in a leading CNAPP solution. This …

Data Theorem and AlphaSOC join forces to protect customers against data exfiltration Read More »

Living Security collaborates with SpyCloud to manage and mitigate human cybersecurity risk

Living Security partners with SpyCloud to better identify segments of human risk inside organizations and help security leaders create a proactive plan to mitigate attacks. Living Security’s Unify Human Risk Management Platform now includes SpyCloud’s Identity Risk Engine, which delivers risk assessments and key risk indicators (KRIs) based on analysis of 300+ billion assets recaptured …

Living Security collaborates with SpyCloud to manage and mitigate human cybersecurity risk Read More »

Apple Is Tracking You Even When Its Own Privacy Settings Say It’s Not, New Research Says

Thomas Germain reports: For all of Apple’s talk about how private your iPhone is, the company vacuums up a lot of data about you. iPhones do have a privacy setting that is supposed to turn off that tracking. According to a new report by independent researchers, though, Apple collects extremely detailed information on you with …

Apple Is Tracking You Even When Its Own Privacy Settings Say It’s Not, New Research Says Read More »

Sterling partners with Yoti to simplify identity verification in hiring processes

Sterling is partnering with digital identity company Yoti, to streamline background checks and expand their digital identity solutions. This collaboration brings together Sterling’s more than 45 years of expertise in background screening with Yoti’s innovative identity verification technology. The global partnership will expand Sterling’s digital identity capabilities in EMEA and APAC, and accelerate its vision …

Sterling partners with Yoti to simplify identity verification in hiring processes Read More »

10 Best Practices for Data Protection

By , Vice President & General Manager, Data Protection, at In 2022, Gartner established its first ever Magic Quadrant for, a new security industry category. SSE acknowledges that protecting a distributed digital business from malicious actors requires three integrated technologies: secure web gateways (SWG) to control internet access, zero trust network access (ZTNA) to control private …

10 Best Practices for Data Protection Read More »

HPE and VMware boost digital transformation with integrated hybrid cloud offering

For more than two decades, Hewlett Packard Enterprise (HPE) and VMware, have been at the leading-edge of driving digital transformations, working with more than 200,000 mutual customers. The companies announced the next phase of this partnership with HPE GreenLake for VMware, bringing together HPE GreenLake and VMware Cloud to deliver a fully integrated solution with …

HPE and VMware boost digital transformation with integrated hybrid cloud offering Read More »

Cisco Investments invests in Elevate Security to advance enterprise user risk management

Elevate Security announced that Cisco Investments has made a strategic investment in the company. This investment will help propel product development and accelerate the company’s roadmap. Elevate is rapidly expanding its cyber risk identification and analysis capabilities to integrate with established security safeguards such as Cisco’s Duo Security solutions, enhancing these offerings with the ability …

Cisco Investments invests in Elevate Security to advance enterprise user risk management Read More »

How Modern Security Teams Fight Today’s Cyber Threats

Digital campaign managers are responsible for the formation, execution, and management of the company’s digital marketing efforts, including SEO/SEM, social media, email and online displays. This download outlines the job responsibilities and what skills to look for in the ideal candidate. From the job description: The digital campaign manager, with the input of senior management, …

How Modern Security Teams Fight Today’s Cyber Threats Read More »

The future of cyber threat prevention lies in open security

For far too long, the cybersecurity industry has subscribed to a flawed methodology — one that is based on the notion that organizations can avoid security threats through obscurity and secrecy. The assumption is that keeping security controls and processes covert makes products and data inherently more secure against cyber threats within the networks we …

The future of cyber threat prevention lies in open security Read More »

How to Manage Global IT Procurement with…

The current fluctuation in exchange rates has significantly impacted the tech industry. With the global chip shortage and supply chain challenges being consistent themes since the start of the pandemic, the current foreign exchange headwinds are adding yet another layer of complexity. The strong value of the dollar surged to its highest level in 20 years, …

How to Manage Global IT Procurement with… Read More »

A look under the hood at eBPF: A new way to monitor and secure your platforms

In this post, I want to scratch at the surface of a very interesting technology that Elastic’s Universal Profiler and Security solution both use called eBPF and explain why it is a critically important technology for modern observability. I’ll talk a little bit about how it works and how it can be used to create …

A look under the hood at eBPF: A new way to monitor and secure your platforms Read More »

Zero Trust at Scale eBook

Zero Trust at Scale will provide you with an insider’s lens into this five-month Zero Trust security metamorphosis, helping you to better understand what similar architecture shifts could look like in your enterprise organization. This guide dives into the sheer vitality of Zero Trust security, nodding to the vast benefits that this solution offered during …

Zero Trust at Scale eBook Read More »

How Modern Security Teams Fight Today’s Cyber Threats (previously known as Plight of Modern Security Teams)

Join or sign in Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below. Use Your Email Join or sign in We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms. Welcome back! Invalid email/username and …

How Modern Security Teams Fight Today’s Cyber Threats (previously known as Plight of Modern Security Teams) Read More »

Secure Shadow IT

An astonishing 98% of cloud services are adopted without any IT oversight. And when your employees act as their own tech professionals to use their favorite chat, cloud storage, and other insecure apps, that’s more than just conducting shadow IT, it’s directly putting your network at risk. Your challenge? Protecting your network against ransomware, malware, …

Secure Shadow IT Read More »

Update: pdf-parser.py Version 0.7.7

Update: pdf-parser.py Version 0.7.7 This is a small update: you can now select which hash algorithm to use for option -H by setting environment variable DSS_DEFAULT_HASH_ALGORITHMS. And the statistics options (-a) also display a list of objects with streams. pdf-parser_V0_7_7.zip (http)MD5: BCAE193F171184F979603DFB1380FF43SHA256: 576C429FA88CF0A7A110DAB25851D90670C88EC4CD7728329E754E06D8D26A70 No comments yet.Read more

Why data protection is essential for your business

Working with a Managed Detection & Response (MDR) providercan help improve threat detection & response capabilities – protecting your organization’s “crown jewels” and mitigatingthe impact of a potential attack. But there is a right way – and a wrong way – to address your enterprise’s security posture and protect sensitive data. In this interview, Prashanth …

Why data protection is essential for your business Read More »

What is MFA, 2FA, 3FA and 4FA ? Just ways of user authentication?

Authentication is the process of demonstrating your identity. The user must verify their identity by supplying particular access credentials in order to access protected information, systems, or places. The primary categories of authentication elements are as follows: Factors of knowledge (what the user is aware of): For instance, a PIN, passphrase, or password. Possession factors: …

What is MFA, 2FA, 3FA and 4FA ? Just ways of user authentication? Read More »

Malicious Python Package Relies on Steganography to Download Malware

Check Point Research has detected a malicious open source code package that uses steganography to hide malicious code inside image files. The malicious package was available on PyPI, a package index widely used by Python developers. After being notified of it, PyPI’s maintainers have removed the malicious package. The malicious package, apicolor, looks like one of …

Malicious Python Package Relies on Steganography to Download Malware Read More »

Insider Threat 101: Understanding The Insider Threat Ecosystem And Best Practices

By Hermann Hesse, vice president of solutions, As organizations continue the fight to keep outside adversaries from penetrating networks, it’s also become critical for security teams to make sure employees, partners and contractors are also not threatening the enterprise. An insider data breach costs companies an average of. That combined with reputational damage and loss …

Insider Threat 101: Understanding The Insider Threat Ecosystem And Best Practices Read More »

Finite State hires Larry Pesce as Product Security Research and Analysis Director

Finite State has hired Larry Pesce as its Product Security Research and Analysis Director. Pesce will serve as a senior consultant, providing expert guidance and services to product security teams worldwide, including product security program design and development, product red-teaming and penetration testing, software supply chain risk management, and vulnerability management. Recent research from the …

Finite State hires Larry Pesce as Product Security Research and Analysis Director Read More »

Election disinformation fueled midterm conspiracies, but far behind 2020 levels, experts found

Written by Suzanne Smalley Nov 9, 2022 | CYBERSCOOP Rumors and mischaracterizations about voting on Tuesday swirled around social media throughout the day, especially related to malfunctioning ballot tabulators in Arizona’s Maricopa County, where officials were still counting votes Wednesday afternoon. The nonprofit Election Integrity Partnership documented more than 40,000 tweets about the tabulators, many …

Election disinformation fueled midterm conspiracies, but far behind 2020 levels, experts found Read More »

Dickey’s Contested $2.35M Data Breach Deal Gets Initial Nod

By Allison Grande (November 9, 2022, 11:18 PM EST) — A Texas federal judge has signed off on a recommendation to preliminarily approve a $2.35 million settlement to resolve a proposed class action over a data breach at Dickey’s Barbecue Restaurants Inc., overriding objections about the deal’s fairness from plaintiffs who weren’t involved in the negotiations.  … …

Dickey’s Contested $2.35M Data Breach Deal Gets Initial Nod Read More »

Bugcrowd appoints Dave Gerry as CEO

Bugcrowd announced the appointment of Dave Gerry as Chief Executive Officer (CEO). As CEO, Gerry will oversee operations, drive growth and profitability, and manage the company’s overall strategy. This appointment follows another year of rapid growth for the company, which has experienced record customer adoption of its crowdsourced cybersecurity solutions and represents the next step …

Bugcrowd appoints Dave Gerry as CEO Read More »