Hacking & Cybersecurity


WEEKLY REVIEW


Trends


Top hashtags

Top influencers

cylanceinc
whitehatsec
cyberdefensemag
RSAConference
DarkReading
InfosecurityMag
SecurityWeek
SCMagazine
CTIN_Global

Top sources

cyberdefensemagazine.com
darkreading.com
infosecurity-magazine.com
threatvector.cylance.com
securityweek.com
forbes.com
threatpost.com
scmagazine.com
rsaconference.com

Get updates live! Follow us on

Subscribe to our mailing list

News

Cybersecurity — Everyone’s Responsibility Within Any Organization.

On Jul 15, 2019
@symantec shared
RT @SymantecCanada: New to the #CLXForum blog. We dig into why #data protection and a strong #cybersecurity defense must be a team effort. ➡ Check it out here: https://t.co/hQcupfkaBa https://t.co/SjeLngVER0
Open

Guest blog by John Hipp, Security Sales Specialist at Insight

medium.com
On Jul 15, 2019
@symantec shared
RT @SymantecCanada: New to the #CLXForum blog. We dig into why #data protection and a strong #cybersecurity defense must be a team effort. ➡ Check it out here: https://t.co/hQcupfkaBa https://t.co/SjeLngVER0
Open

Cybersecurity — Everyone’s Responsibility Within Any Organization.

Guest blog by John Hipp, Security Sales Specialist at Insight



On Jul 13, 2019
@whitehatsec shared
The cyber threat is growing in every sized business. Organizations should consider these 3 security trends to shift the way they guard against attacks: https://t.co/MDCi8xvMzh via @cioreview https://t.co/ZjCmt346Ug
Open

Top 3 Cybersecurity Trends that Modern Businesses Should Look out For

Top 3 Cybersecurity Trends that Modern Businesses Should Look out For By CIOReview - Cybersecurity is laced with highest security systems, playing a prominent role in curbing cyber theft ...

On Jul 16, 2019
@RSAConference shared
Why #AI is the future of #cybersecurity: https://t.co/0QKqyZH9p0 via @forbes
Open

Why AI Is The Future Of Cybersecurity

61% of enterprises say they cannot detect breach attempts today without the use of AI technologies.

On Jul 13, 2019
@whitehatsec shared
What technology will most impact the future of cybersecurity? Nice roundup from @DisruptorDaily: https://t.co/01XTwDHMpz
Open

What Technology Will Most Impact the Future of Cybersecurity? 33 Experts Share Their Insights

A computer without a robust cybersecurity framework is the equivalent of a wallet… ...

On Jul 16, 2019
@cylanceinc shared
#CaseStudy: Dexar Group Takes on #Cybersecurity. "#CylancePROTECT is a perfect example. It’s saving us time, money, and effort in meeting our stringent requirements for endpoint defense.” CIO Daniel Cox. Read the full case study here: https://t.co/b7VsBBhOBq https://t.co/dwe2aGhrRV
Open

Case Study: Dexar Group Takes on Cybersecurity

Dexar Group has gained national recognition as a trusted house of real estate sales and property management. An enticing target for cyber criminals attracted by real estate transactions, ...

On Jul 10, 2019
@CTIN_Global shared
Iasiello_E: Rampant Ransomware Attacks: How Cybercriminals Target Governments https://t.co/91BXBBrDuc
Open

Rampant Ransomware Attacks: How Cybercriminals Target Governments

Across the country, cybercriminals are locking up local government files until ransom is paid. We look at the growing threat of ransomware attacks.

On Jul 11, 2019
@cylanceinc shared
#Security Gets Smart with AI -- Top three uses for #ArtificialIntelligence: 1. Cyber defense (75%), 2. #Malware prevention (71%), 3. Advanced threat detection/prevention (69%). Learn more: https://t.co/UfjvSF3Imy https://t.co/DqHzXfWj0F
Open

Click here to read the article

• Top three technologies considered part of an AI-enabled solution: - Predictive analysis (76%) - Deep learning platform (74%) - Machine learning platform (73%) • Top three uses ...

On Jul 15, 2019
@SecurityWeek shared
Failures in Cybersecurity Fundamentals Still Primary Cause of Compromise: Report https://t.co/BRZLWylats
Open

Failures in Cybersecurity Fundamentals Still Primary Cause of Compromise: Report

Analysis of more than 1,000 incident response engagements undertaken during 2018 found that failures in cybersecurity fundamentals remain a primary cause of compromise.

On Jul 15, 2019
@whitehatsec shared
"The fight against cybercrime is not easy, particularly when the goal posts keep changing. But the cybersecurity industry is working hard to constantly innovate to prevent adversaries from winning." Great article from CSO Joseph Feiman >> https://t.co/gVtkMOblfh via @Forbes
Open

Cybersecurity's Evolution: How It May Look Over The Next Few Years

The fight against cybercrime is not an easy one, particularly when the goal posts keep changing.

On Jul 12, 2019
@whitehatsec shared
With all the cyber crime happening, there are still many that are underreported. @cpomagazine shares an annual report on cyber security trends >> https://t.co/UKtXC5rwkC https://t.co/hbMSwwEyhi
Open

Cyber Crime Widely Underreported Says ISACA 2019 Annual Report on Cyber Security Trends

Recent 2019 ISACA annual report shows key interesting cyber security trends which includes underreporting of cyber crimes and internal employees being the third-greatest security threat.

Browse topics

Get updates live! Follow us on

Subscribe to our mailing list

On Jul 10, 2019
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky Sharing an important story about 10 Steps to Kicking Off Your Insider Threat Program #cybersecurity #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/yn7wtIaxOv by Mark Wojtasiak @markwojtasiak who we hope to see @BlackHatEvents #CDM https://t.co/xP6lKOWlSt
Open

10 Steps to Kicking Off Your Insider Threat Program

Building an insider threat program goes far and beyond “best practices.” It usually involves an entire team dedicated exclusively to insider threat detection and response, which sounds ...

On Jul 12, 2019
@RSAConference shared
#Singapore companies are more frequently victims of #financialfraud compared to other APAC countries. Why? #RSAC 2019 APJ speakers Etay Maor, Executive Security Advisor, @IBMSecurity and @irawinkler, President, @SecureMentem, discuss in @SBRMagazine: https://t.co/p9HOiRNc8F
Open

Singapore companies victims of social engineering: whose fault is it?

With more than 1 in 4 companies experiencing business email compromise scams in the past year, Singapore was found to be the most targeted country in this area across Southeast Asia.

On Jul 10, 2019
@SCMagazine shared
Three common cybersecurity scenarios and tips for preventing them https://t.co/8GUCowiMCW
Open

Three common cybersecurity scenarios and tips for preventing them

It happens to the best of us. We open our laptop to browse the web or check emails when all of a sudden our computer freezes, and a message appears

On Jul 12, 2019
@kaspersky shared
Our researchers recently published a report and found almost 500 million users hit by #phishing attacks (https://t.co/l8CUFBggVr). Learn about the most common tricks used by #spammers so you don't fall for them! 🎣 Details below 👇 https://t.co/UXqc68JNoQ
Open

Mobile malware evolution 2018

Users of mobile devices in 2018 faced what could be the strongest cybercriminal onslaught ever seen. Over the course of the year, we observed both new mobile device infection techniques and ...

On Jul 16, 2019
@defcon shared
RT @CarHackVillage: CHV CFP would like to thank @a_aar0n for his submission to the @CarHackVillage @defcon. Please check out this and more talks at https://t.co/K9lldc9oX0
Open
On Jul 16, 2019
@AccentureSecure shared
Read the first of its kind – the Threat Trend Report from [email protected] and [email protected]_ISAC helps #retail and #hospitality companies identify #cybersecurity risks: https://t.co/Sk8TN12jGV https://t.co/yAtrDKg0OU
Open

Retail and Hospitality Threat Trend Report

Retail and hospitality industries are expanding digital channels while threat analysis indicates cybercriminals and cyber-espionage groups remain active.

On Jul 16, 2019
@SecurityWeek shared
Old Software Makes New Electoral Systems Ripe for Hacking - https://t.co/FVpGShDm0G < Many “new” electoral systems using Windows 7
Open

Old Software Makes New Electoral Systems Ripe for Hacking

Many U.S. counties are buying new electoral systems, but they still run on old software that will soon be outdated and more vulnerable to hackers.

On Jul 11, 2019
@cyberdefensemag shared
@cyberdefensemag Publisher @miliefsky Sharing an important story about How to secure your network traffic? #cybersecurity #CYBER #SECURITY in this #CDM #EXCLUSIVE https://t.co/bBH8uoqNVD by Milica D. Djekic @MilicaDjekic9 who we hope to see @BlackHatEvents #CDM https://t.co/LWvs3x2wmG
Open

How to secure your network traffic?

By Milica D. Djekic A computer network is a group of devices being connected to the internet and forming a big web entity out of them. It’s quite good to mention that the computer or device ...

On Jul 10, 2019
@RSAConference shared
RT @tradeshownews: Hype vs Reality in 2019: Experts Weigh in on Hotly Contested Statements About Cybersecurity https://t.co/mpBt4QEJ4Y #RSAC
Open

Hype vs Reality in 2019: Experts Weigh in on Hotly Contested Statements About Cybersecurity

RSA Conference, the world’s leading information security conferences and expositions, today unveiled expert insights into salient issues around emergi