Top news of the week: 11.05.2021.
Threats And Attacks
Multi-Factor Authentication: Headache for Cyber Actors Inspires New Attack Techniques
Two-factor or multi-factor authentication is used to secure organizations and accounts from attackers, making it a problem for malicious actors. Recent attacks show how they are attempting ...
Cymulate nabs $45M to test and improve cybersecurity defenses via attack simulations
With cybercrime on course to be a $6 trillion problem this year, organizations are throwing ever more resources at the issue to avoid being a target. Now, a startup that’s built a platform ...
Innovations And Trends
Banking Mergers: Bigger Isn’t Always Better
As financial institutions seek increased scale to achieve digital transformation, the real need is for digital leadership.
Cybersecurity Awareness Calendar
We are compiling this as a directory of relevant services and solutions on our website as an ongoing resource related …
Data Privacy
10 Things You Might Not Know About Cyber Essentials
A UK view on Cyber (IT Security) & Information Security. Covers everything Computer Security from the basics to the advanced
Cyber insurers now demanding firms have MFA, says Canadian broker
Multifactor authentication is increasingly being demanded as a price of cyber insurance, a Vancouver insurance broker says
Startups And Investments
7 Crisis Management Lessons From Colonial Pipeline’s Response To Cyber Attack
Friday’s ransomware attack on Colonial Pipeline has created a crisis for the company and the country provides important lessons for business leaders on how to respond and manage crisis ...
Largest U.S. pipeline shuts down operations after ransomware attack
Colonial Pipeline, the largest fuel pipeline in the United States, has shut down operations after suffering what is reported to be a ransomware attack.
Companies And Services
Key U.S. Energy Pipeline Closes After Cyberattack
The operator of the Colonial Pipeline, the main conduit carrying gasoline and diesel fuel to the U.S. East Coast, temporarily shut down all operations after discovering a cyberattack.
How China turned a prize-winning iPhone hack against the Uyghurs
In March 2017, a group of hackers from China arrived in Vancouver with one goal: Find hidden weak spots inside the world’s most popular technologies. Google’s Chrome browser, Microsoft’s ...
Business And Industries
Wanted: The (Elusive) Cybersecurity 'All-Star'
Separate workforce studies by (ISC) 2 and ISACA point to the need for security departments to work with existing staff to identify needs and bring entry-level people into the field.
Why companies need a Chief Product Security Officer
RSA plans an all-virtual show starting on May 17. Today's columnist, Kacy Zurkus of the RSA Conference, writes about why companies need to strongly consider a Chief Product Security Officer ...