November 15, 2018

[Blog] How to Close the Cyber Security Skills Shortage by Maximizing Existing Resources

Sean Falconi

This blog post discusses tools and processes that can be used to tackle the cyber security talent shortage. Some of these include reprioritizing staff resources and how to justify a budget increase.

Read More

[Blog] The Beginner’s Guide to External Penetration Testing Reconnaissance

Michael Piscopo

This blog post discusses how our pen testing experts are trained to “think like hackers.” It details various tools and techniques that, when used ethically, along with open source intelligence, can to improve your organization’s overall security.

Read More

Fines and Lawsuits Are Adding to the Cost of Corporate Data Breaches, November 13, 2018

Hackers constantly probe computer networks worldwide for vulnerabilities, seeming to pull off a major cyberattack almost weekly. In the past three weeks alone, HSBC Bank of London reported that its U.S.-based accounts were illegally accessed; hackers compromised an Australian military shipbuilder’s personnel files; and Hong Kong airline Cathay Pacific confirmed a breach that affected up to 9.4 million passengers.

Read More

WannaCry Remains a Threat, Attacking Nearly 75,000 Users in Q3 2018, November 12, 2018

Kaspersky Lab has released its Q3 IT Threat Evolution Report, which revealed that a year and a half after its epidemic, WannaCry ransomware tops the list of the most widespread cryptor families. The ransomware attacked 74,621 unique users worldwide during the last quarter, accounting for 29 percent of all users targeted by cryptors in Q3 2018.

Read More

U.S. Cyber Security Job Market Cries for Help as Demand for Top Talent Soars, November 12, 2018

Employer demand for cyber security professionals across the United State continues to soar, according to new data from Burning Glass Technologies. While the U.S. houses hundreds of thousands of cyber security workers, there are still plenty of chairs to fill in IT departments across the nation.

Read More

Moody’s Will Start Building Risk of a Business-Ending Hack into Credit Ratings, November 12, 2018

Moody’s will soon start using its credit-rating expertise to evaluate organizations on their risk to a major impact from a cyber-attack. That move might be a game-changer for many institutional and individual investors, who often struggle to quantify the potential impact of a significant cyber security incident into a meaningful rating.

Read More

DOD File Sharing Tool Disabled Due to Vulnerability, November 12, 2018

Department of Defense leaders have disabled a secure file sharing system due to security risks and have not set a date to reinstate the technology. The Army Aviation and Missile Research Development and Engineering Center Safe Access File Exchange, or AMRDEC SAFE site was disabled as a preventative measure after outside agencies identified potential security risks.

Read More

Third-Party Data Breach Exposes Information of Alabama Hospital Job Applicants, November 12, 2018

Huntsville Hospital in Alabama announced that the personal data of job applicants may have been compromised after a security incident at a third-party recruitment platform. Social Security numbers of thousands of people may have been leaked online.

Read More

Sign Up for Our Newsletter

financial newsletterhealthcare newsletter
Infosecurity Newsletter Archive

June 2018: 6th

May 2018: 2nd, 9th, 30th

April 2018: 4th, 11th, 18th, 25th

March 2018: 7th, 14th, 21st, 28st

February 2018: 7th, 14th, 21st, 28th

January 2018: 3rd, 10th, 17th, 24th, 31st

December 2017: 6th, 13th, 20th

November 2017: 1st, 15th, 29th

October 2017: 4th, 11th, 18th, 25th

September 2017: 6th, 13th, 20th, 27th

August 2017: 2nd, 9th, 16th, 23rd, 30th

July 2017: 5th, 12th, 19th, 26th

June 2017: 7th, 14th, 21st, 28th

May 2017: 3rd, 10th, 17th, 24th, 31st

April 2017: 5th, 12th, 19th, 26th

March 2017: 1st, 8th, 15th, 22nd, 29th

February 2017: 1st, 8th, 13th, 22nd

January 2017: 4th, 11th, 18th, 24th

December 2016: 7th, 14th, 21st, 28th

top cyber incident pain points