Cybersecurity Essentials


Cybersecurity Essentials publishes only the best Cybersecurity news and links, carefully hand-picked and curated by top cybersecurity experts, enthusiasts and thought-leaders.

On Jul 9, 2020
@georgevhulme shared
RT @kwestin: Honeywell Sees Rise in USB-Borne Malware That Can Cause Major ICS Disruption https://t.co/L5lE5uwd18
Open

Honeywell Sees Rise in USB-Borne Malware That Can Cause Major ICS Disruption

Honeywell Sees Rise in USB-Borne Malware That Can Cause Major ICS Disruption

Honeywell has seen a significant increase in USB-borne malware that can cause major disruption to industrial control systems (ICS)

On Jul 3, 2020
@kaspersky shared
How to strengthen your #cybersecurity line of defense while employees are working from home: https://t.co/iTAt3UXTqb https://t.co/QrBoOPdd2D
Open

The state of cybersecurity in the time of COVID-19

The state of cybersecurity in the time of COVID-19

While the world is locked down and quarantining, cybercriminals are out playing. Here’s what’s happening, and how we’re helping.

On Jul 9, 2020
@DarkReading shared
Our collection of news and commentary related to COVID-19, now updated with the latest content: https://t.co/pNW9zr22Mp #coronavirus #COVID19 #pandemic
Open

COVID-19: Latest Security News & Commentary

COVID-19: Latest Security News & Commentary

Check out Dark Reading's updated, exclusive news and commentary surrounding the coronavirus pandemic.

On Jul 8, 2020
@automeme shared
4 Evolving Technology Areas Of Smart Cybersecurity via @forbes https://t.co/Yboc7ps7Cg By @ChuckDBrooks #AI #BigData #SmartCity #Blockchain #Innovation #MachineLearning @HeinzVHoenen @LindaGrass0 @antgrasso_IT
Open

4 Evolving Technology Areas Of Smart Cybersecurity

4 Evolving Technology Areas Of Smart Cybersecurity

The surge in digital connectivity and more sophisticated cyber-threats has promulgated the need for smart cybersecurity.

On Jul 6, 2020
@FogorosAndrei shared
RT @ChuckDBrooks: Please see my latest blog published in Cybertheory on protecting critical infrastructures. Thanks and have a safe and happy weekend! @ChuckDBrooks https://t.co/Y1zJ9xyRhA
Open

The Cybersecurity Imperative of Protecting Critical Infrastructure

The Cybersecurity Imperative of Protecting Critical Infrastructure

Over 80% of the critical infrastructure, including defense, oil and gas, electric power grids, healthcare, utilities, communications, transportation, education, banking and finance, is ...

On Jul 4, 2020
@archonsec shared
RT @ipfconline1: #AI In #Cybersecurity: Limitations, Use cases & Examples https://t.co/4CNywvLPab v/ @Usmsys #Mobility #AI #MachineLearning #DigitalTransformation Cc @SpirosMargaris @jblefevre60 @Shirastweet @TriciaKicksSaaS @StephaneNappo @cybersecboardrm @digitalcloudgal @roxanasoi @archonsec https://t.co/C18Dds4Wk5
Open

AI In Cybersecurity: Limitations, Use cases & Examples

AI In Cybersecurity: Limitations, Use cases & Examples

AI In Cubersecurity get to know the evolution of cybersecurity solutions for organizations and their top uses and few practical usecases

On Jul 9, 2020
@antgrasso shared
Leveraging Analytics and Automation for key Cyber Security domains. @Atos Cyber Security Strategy by @ZeinaZakhour Link >> https://t.co/1TlowaOQyW via @antgrasso @antgrasso_IT #CyberSecurity #Analytics #AI https://t.co/cLuKrpyDKg
Open

Cybersecurity

Cybersecurity

Protect your critical assets with Atos’ prescriptive cybersecurity solutions that include provided an integrated and automated security framework that provides end-to-end security, active ...

On Jul 3, 2020
@bradnelsonops shared
RT @YuHelenYu: #IoT connected devices will grow from 27 billion in 2017 to 125 billion in 2030. #Blockchain promises to be an important tool in the arsenal of #cybersecurity specialists. @kuriharan @avrohomg @ipfconline1 @dinisguarda @Ronald_vanLoon https://t.co/yYcBBnWaxf via @Techopedia
Open

Do You Fear Blockchain? 5 Cybersecurity Benefits

Do You Fear Blockchain? 5 Cybersecurity Benefits

Blockchain technologies promise to be an important tool in the arsenal of cybersecurity sp

On Jul 4, 2020
@hackernoon shared
"10 Reasons to Get Your Cybersecurity Certification" https://t.co/pcEs6kT2rh #cybersecurity #security
Open

10 Reasons to Get Your Cybersecurity Certification

10 Reasons to Get Your Cybersecurity Certification

The set of skills that are mostly expected by the employers can be gained by the cybersecurity certifications, it will prepare you for the diversity needed in the sophisticated areas of ...

On Jul 6, 2020
@SecurityExpert shared
Hacker ransoms 23k MongoDB databases and threatens to contact GDPR authorities https://t.co/f6hsyWZd5d via @ZDNet & @campuscodi
Open

Hacker ransoms 23k MongoDB databases and threatens to contact GDPR authorities

Hacker ransoms 23k MongoDB databases and threatens to contact GDPR authorities

The hacker has attempted to ransom nearly 47% of all MongoDB databases left exposed online.

On Jul 8, 2020
@wbm312 shared
The hidden trackers in your phone, explained https://t.co/pVuchCcH7x
Open

The hidden trackers in your phone, explained

The hidden trackers in your phone, explained

How covert code enables your phone’s apps to spy on you.

On Jul 3, 2020
@WeldPond shared
Some good thinking went into the EU Cyber Security for Consumer Internet of Things: Baseline Requirements https://t.co/xRgdGzhrQq
Open

EN 303 645 - V2.1.1 - CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements

EN 303 645 - V2.1.1 - CYBER; Cyber Security for Consumer Internet of Things: Baseline Requirements

Contents Intellectual Property Rights ................................................................................................................................ 4 Foreword ...

On Jul 8, 2020
@kaspersky shared
RT @KasperskyICS: Exploring new horizons and technologies? Find out how to keep your industrial business safe from the growing risks and severity of cyberattacks: https://t.co/VqlFgsXLUs https://t.co/og0zBIltuP
Open

Industrial cyberattacks are on the rise. Technology and your people can stop them.

Industrial cyberattacks are on the rise. Technology and your people can stop them.

Exploring new horizons and technologies? Here’s how to keep your industrial business safe from the growing risks and severity of cyberattacks.

On Jul 7, 2020
@McAfee shared
Everyone's on their phones📱 more than ever, and the same goes for hackers. Learn about the latest security risks and how to secure your phone. https://t.co/MmOcZVVgdO https://t.co/SqbYieah9g
Open

How Do Hackers Hack Phones and How Can I Prevent It?

How Do Hackers Hack Phones and How Can I Prevent It?

The threat of having your phone hacked has become a common fear. The truth is that it is possible to hack any phone. With the advancement of technology, where discovery of knowledge and ...

On Jul 5, 2020
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky Sharing an important story about 3 Practices to Avoid Security #cybersecurity #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/TiIwj9MYJy by Akshay Bhargava @Malwarebytes who we hope to see @BlackHatEvents 2020 #CDM https://t.co/AwuYmJMiGk
Open

3 Practices to Avoid Security Risk in A Work from Home World

3 Practices to Avoid Security Risk in A Work from Home World

By Akshay Bhargava, Chief Product Officer, Malwarebytes Well before COVID-19 hastened people working from home, users embraced “bring your own device” (BYOD) practices. It created a ...

On Jul 9, 2020
@winklhawk shared
Filling the Cybersecurity Skills Gap With FortiVets #cybersecurity #feedly https://t.co/J8CxbaCTqb
Open

Filling the Cybersecurity Skills Gap With FortiVets

Filling the Cybersecurity Skills Gap With FortiVets

Veterans have many complementary skills that can be relevant to a career in cybersecurity. Read more about Fortinet’s Veterans Program, which focuses on helping veterans transition into ...

On Jul 7, 2020
@SCMagazine shared
Mounting Industrial Internet of Things cyber risks must be addressed now to prevent a catastrophe, says a report from Lloyd’s Register Foundation. @lloydsregister #IIoT https://t.co/qDXe9fjPNR
Open

Mounting IIoT cyber risks must be addressed now to prevent catastrophe: report

Mounting IIoT cyber risks must be addressed now to prevent catastrophe: report

Critical infrastructure globally across sectors are at a particularly vulnerable state due to the continued heightened pace of cyberattacks on the

On Jul 3, 2020
@DXCTechnology shared
It’s critical to consider adversary emulation at both technical and behavioral levels to ensure highly effective post-compromise resilience. Download this paper to explore key approaches to help security teams focus on key objectives: https://t.co/177plyuDy3 #Cybersecurity https://t.co/5iacsxEnIc
Open

Adversary emulation: Measure your ability to detect attackers

Adversary emulation: Measure your ability to detect attackers

Vulnerability management, penetration testing and red teaming are key exercises, but it’s critical to consider adversary emulation at both technical and behavioral levels to ensure highly ...

On Jul 6, 2020
@knash99 shared
Industry leaders should aim to educate startups on where problems need to be solved, rather than emulating successful firms, security chiefs say https://t.co/3A5oHhTaKm via @WSJ @WSJCyber
Open

Cybersecurity Veterans Find Benefits and Challenges with Advisory Roles

Cybersecurity Veterans Find Benefits and Challenges with Advisory Roles

Long-serving security professionals can use their experience to advise startups, but conflicts of interest must be managed appropriately.

On Jul 7, 2020
@openbusinesshq shared
RT @HernaldoTN: Interview With Sandra Tobler @s_A_N_d_r_a___, CEO and Founder of @_futurae sharing her insights about #Cybersecurity and #Fintech https://t.co/SacFWUI68O @dinisguarda @HiltonSupra
Open

Interview With Sandra Tobler, CEO and Founder Futurae - Cybersecurity and Fintech

Interview With Sandra Tobler, CEO and Founder Futurae - Cybersecurity and Fintech

Head of Research – IIS , SRH Berlin – Building Blockchain and AI Foundations and Ethics Sandra Tobler Profile Sandra Tobler is an entrepreneur who worked in the IT space for many ...

On Jul 8, 2020
@CybersecuritySF shared
Who's buying who in the #cybersecurity space? Read the latest quarterly Mergers & Acquisitions report from Cybersecurity Ventures @CybersecuritySF to find out. https://t.co/JNX9VcFf12 via Cybercrime Magazine
Open

Cybersecurity M&A Report, Vol. 4, No. 2: Buyers Include Microsoft, Cisco, VMware, CyberArk, Rapid7

Cybersecurity M&A Report, Vol. 4, No. 2: Buyers Include Microsoft, Cisco, VMware, CyberArk, Rapid7

Aon, Stone Point Capital, Advent International, Hellman & Friedman, and Insight Partners all post billion dollar deals during quarter

On Jul 8, 2020
@HackingDave shared
RT @TrustedSec: Want to explore how to make better use of the ATT&CK framework? Join @RockieBrockway and @rick_yocum for our newest #security #webinar taking place 7/15 at 1pm ET. Register now! https://t.co/4WTqZdxQKi
Open

MITRE ATT&CK™ Solutions Update and Evolution: Exploring Advanced Applications of ATT&CK

MITRE ATT&CK™ Solutions Update and Evolution: Exploring Advanced Applications of ATT&CK

Learn more about Webinar - MITRE ATT&CK™ Solutions Update and Evolution: Exploring Advanced Applications of ATT&CK from TrustedSec, the leading US security consulting team.

On Jul 9, 2020
@vmw_carbonblack shared
🛡Are you ready for #BlackHat2020? Visit our virtual booth on August 5th & 6th. Meet with our technical experts, participate in our Threat Hunting On-Demand Workshop, and more: https://t.co/1bSX3SwGek https://t.co/knClXufOhr
Open

Threat Hunting On-Demand Workshop

Threat Hunting On-Demand Workshop

Learn More August 5 | On-Demand Mitigating Cyber Escalation: Modernizing Cybersecurity with Intrinsic Security Join Tom Kellermann and Greg Foss from VMware Carbon Black as they discuss the ...

On Jul 7, 2020
@StaySafeOnline shared
@staysafeonline ‘s @danieleliot details the importance of having an incident response plan to combat a #databreach @TechRepublic #cybersecurity #staysafeonline https://t.co/G3R2lTgOZG
Open

Be prepared: Why you need an incident response policy

Be prepared: Why you need an incident response policy

Smart security teams have updated incident response plans in place before a security breach happens.