Risk, Physical information security, Bruce Schneier, Information security, Data security, Computer security

Week in review: Sudo vulnerability, Emotet takedown, execs targeted with Office 365 phishing

On Jan 31, 2021
@helpnetsecurity shared
Week in review: Sudo vulnerability, Emotet takedown, execs targeted with Office 365 phishing - https://t.co/E0nppTHvP2 https://t.co/ON0fSIVgyV
Open

Here's an overview of some of last week's most interesting news and articles: “Serious” vulnerability found in Libgcrypt, GnuPG’s cryptographic library

www.helpnetsecurity.com
On Jan 31, 2021
@helpnetsecurity shared
Week in review: Sudo vulnerability, Emotet takedown, execs targeted with Office 365 phishing - https://t.co/E0nppTHvP2 https://t.co/ON0fSIVgyV
Open

Week in review: Sudo vulnerability, Emotet takedown, execs targeted with Office 365 phishing

Week in review: Sudo vulnerability, Emotet takedown, execs targeted with Office 365 phishing

Here's an overview of some of last week's most interesting news and articles: “Serious” vulnerability found in Libgcrypt, GnuPG’s cryptographic library

Endpoint Security

Endpoint Security

​Endpoint security refers to the strategies and technologies for preventing, containing, mitigating, and remediating threats to endpoints. In this glossary post, we will explore endpoint ...

Week in review: Windows zero-day exploited, Patch Tuesday forecast, selecting a compliance solution

Week in review: Windows zero-day exploited, Patch Tuesday forecast, selecting a compliance solution

Here's an overview of some of last week's most interesting news, reviews and articles: Git LFS vulnerability allows attackers to compromise targets’

Top 6 cybersecurity trends to watch for at Black Hat USA 2020

Top 6 cybersecurity trends to watch for at Black Hat USA 2020

Experts weigh in to share their thoughts on the hottest topics to expect at this year's all-digital Black Hat conference.

IT Security, Information Security and Data Security

IT Security, Information Security and Data Security

What is IT security, information and data security, what are the differences and how can the state of sustainable resilience be achieved

The Top 21 Security Predictions for 2021

The Top 21 Security Predictions for 2021

As we recover from the worst pandemic in a century, what will the New Year bring in cyberspace? Here’s your annual roundup of security industry forecasts, trends, themes and cybersecurity ...

The A-Z of security threats 2018

The A-Z of security threats 2018

Industry experts give their thoughts on the growing range of threats facing modern businesses

The ultimate guide to cybersecurity planning for businesses

The ultimate guide to cybersecurity planning for businesses

In this comprehensive guide to cybersecurity planning in businesses, you'll learn why effective cybersecurity is important to organizations, its business benefits, the challenges that ...

10 Best Practices for Network Security Management

10 Best Practices for Network Security Management

While security teams have been battling a landscape of constantly evolving external attacks for years, now they are also accountable for addressing the risk of insider breaches. The truth ...

Speakers (preliminary) - DeepSec IDSC 2019 Europe

Speakers (preliminary) - DeepSec IDSC 2019 Europe

In this course, students will learn through a combination of lecture and approximately 15 hands-on labs (depending on workshop duration): - Identify key strategies for network security ...

InfoSec Awards For 2020 – Winners

InfoSec Awards For 2020 – Winners

Publisher’s Choice Cyber Threat Services Awake Security Best Product Cybersecurity Analytics BlackBerry Hot Company Cybersecurity Artificial Intelligence Darktrace Most Innovative ...

Jäsenet

Jäsenet

Our comprehensive service and consulting portfolio includes information security management systems (ISMS), secure software development life cycle processes, information security processes ...

Capital Region Virtual Cybersecurity Summit

Capital Region Virtual Cybersecurity Summit

He holds industry certifications in information security (CISSP), risk management (CRISC), and privacy (CIPT), and has presented on RSA’s behalf internationally at cybersecurity events ...

Managing Passwords and Local Administration Rights: a Two-Step Approach to a Secure Workflow

Managing Passwords and Local Administration Rights: a Two-Step Approach to a Secure Workflow

Information security starts with employee education. By now, most everyone knows the importance of security training and walking every employee through the dangers of phishing scams, ...