Top news of the week: 18.06.2020.

#cybersecurity #infosec #WFH #EthicalHacker #Cisco #Data #Microsoft #AWS #cve #ITSecurity

Threats And Attacks

On Jun 16, 2020
@CiscoUmbrella shared
RT @ChuckRobbins: We’re bringing simplicity and automation to security with #SecureX. Amazing to see this in action during #CiscoLive! Thanks @geerittenhouse for sharing this with our customers and partners today! https://t.co/qdDWjoXeg1 https://t.co/SWBzHnVZJA
Open

Cisco Radically Simplifies Security for Today’s Accelerated IT Agenda

Cisco Radically Simplifies Security for Today’s Accelerated IT Agenda

With remote work on the rise, CISOs can leverage SecureX to achieve unified visibility across Cisco security products, …

On Jun 12, 2020
@WIRED shared
A new malware has surfaced that kills the software process of industrial control systems, encrypts the underlying data, and holds it hostage until the victims pay up https://t.co/WGkCeD0aKL
Open

Mysterious New Ransomware Targets Industrial Control Systems

Mysterious New Ransomware Targets Industrial Control Systems

EKANS appears to be the work of cybercriminals, rather than nation-state hackers—a worrying development, if so.

Innovations And Trends

On Jun 12, 2020
@sbmeunier shared
RT @BeyondTrust: Report: Working from home is the new normal, but cybersecurity isn't keeping up https://t.co/TiycSbWrRD via @techrepublic #cybersecurity #remoteworking #cyberattacks #wfh
Open

Report: Working from home is the new normal, but cybersecurity isn't keeping up

Report: Working from home is the new normal, but cybersecurity isn't keeping up

COVID-19 has completely changed the work world, but many organizations have seemingly failed to realize that security risks are changing as well, a new report finds.

On Jun 15, 2020
@archonsec shared
#cybersecurity #infosec VIA @louiscolumbus Why Securing Endpoints Is The Future Of Cybersecurity👇 @chuckdbrooks @mclynd @DrJDrooghaag @digitalcloudgal @fogle_shane @todddlyle @tgravel @triciakickssaas @gvalan @robmay70 @KaiGrunwitz @BillMew https://t.co/8R7kRc5IUw
Open

Why Securing Endpoints Is The Future Of Cybersecurity

Why Securing Endpoints Is The Future Of Cybersecurity

Verizon’s DBIR reflects the stark reality that organized crime-funded cybercriminals are relentless in searching out unprotected endpoints and exploiting them for financial gain, which is ...

Data Privacy

On Jun 17, 2020
@RSAsecurity shared
In a new normal of #RemoteWork, businesses are more vulnerable to human error and insider threats. Learn how to manage this #cybersecurity risk: https://t.co/lth0uxK8JF
Open

The Changing Face of Insider Threats

The Changing Face of Insider Threats

Learn how digital transformation is changing insider threats.

On Jun 16, 2020
@SecurityExpert shared
Shopped with Claire's online? Hackers may have stolen your card details https://t.co/aodONA61g7 https://t.co/Mh00pL4u6P
Open

Shopped with Claire's online? Hackers may have stolen your card details

Shopped with Claire's online? Hackers may have stolen your card details

The accessories company confirms that criminals intercepted payment card details used on its online store for a number of weeks.

Startups And Investments

On Jun 13, 2020
@hackernoon shared
"Spyse Introduction: Cybersecurity Search Engine for Data Gathering  " by @Hanna_Honney https://t.co/EaqyBMzAcA #cybersecurity #cve
Open

Spyse Introduction: Cybersecurity Search Engine for Data Gathering

Spyse Introduction: Cybersecurity Search Engine for Data Gathering

Data gathering has always been a long process which required multiple services running simultaneously and spending hours scanning alone. With new services like the Spyse search engine, ...

On Jun 12, 2020
@ThePaypers shared
[email protected] offers insurance policy, teams up with @pineapplepmts to combat #cybercrime https://t.co/neVb1pCMDb
Open

FifthWall offers insurance policy, teams up with Pineapple Payments to combat cybercrime

FifthWall offers insurance policy, teams up with Pineapple Payments to combat cybercrime

FifthWall, a team of cybersecurity professionals protecting organisations from cybersecurity threats, has launched a …

Companies And Services

On Jun 17, 2020
@SCMagazine shared
InfoSec World 2020 has gone digital and will take place June 22-24. Here's a preview piece on some of the Privacy & Risk sessions taking place at the virtual conference... #InfoSecWorld @InfoSec_World https://t.co/lfR9qMcWom
Open

Aflac’s Tim Callahan presses hard line on managing third-party risk

Aflac’s Tim Callahan presses hard line on managing third-party risk

Ask 100 people to define risk and you’ll get 100 definitions (if not more), but all typically agree on one thing: identifying and managing risk is

On Jun 12, 2020
@ericgarland shared
RT @burgessct: An 8-yr con -> Courtney filleted the OPSEC of his victims both on an individual level, as well as, company level. #natsec #opsec #intelligence #counterintelligence FYI: @DCSAgov @NCSCgov @ODNIgov @CIA https://t.co/OKIqst5K0K My thoughts for @ClearanceJobs
Open

Guilty: Gutting U.S. Companies’ OPSEC by Posing as a Deep Cover CIA Officer

Guilty: Gutting U.S. Companies’ OPSEC by Posing as a Deep Cover CIA Officer

Kenneth Courtney, a former public affairs officer for the DEA pleaded guilty to posing as a covert CIA officer and conning U.S. companies out of over $4 million, gutting contractor OPSEC. ...

Business And Industries

On Jun 15, 2020
@InsiderPro_IDG shared
Top 15 certifications in demand for 2020 — Included on the list: #AWS Certified Solutions Architect, Certified #Data Professional, Certified #EthicalHacker, #Cisco Certified Network Associate, and #Microsoft Technology Associate. (via @CIOonline) https://t.co/OfWlCLgDSp
Open

Top 15 certifications in demand for 2020

Top 15 certifications in demand for 2020

IT certifications can help you quickly gain and validate valuable skills and know-how in a domain that will further your career. Here are the most popular IT certs today.

On Jun 17, 2020
@cybersecboardrm shared
Hackers Target Military and Aerospace Staff by Posing as HRs Offering Jobs #Cybersecurity #security https://t.co/Z8h6MZzlo4
Open

Hackers Target Military and Aerospace Staff by Posing as HRs Offering Jobs

Hackers Target Military and Aerospace Staff by Posing as HRs Offering Jobs

Operation In(ter)ception: Hackers Target Military and Aerospace Staff by Posing as HRs Offering Jobs on LinkedIn