The Extended Perimeter: Evaluating Third Party Risk (LEO Cyber Security, Jul 05 2017)
The days of self-contained organizations are obsolete. Through supply chain, distribution channels, service providers, facility maintenance, or outsourced services, we are all dependent on other businesses to keep our environments secure. …

The Evolution of Intrusion Detection/Prevention: Then, Now and the Future (SecureWorks Blog, Jul 06 2017)
Learn how intrusion detection and prevention systems have changed over time and what to expect looking ahead…

Petya Weren’t Expecting This: Ransomware Takes Systems Hostage Across the Globe (X-Force Research – Security Intelligence, Jun 27 2017)
It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry….

Hackers are using this new attack method to target power companies | ZDNet (ZDNet, Jul 10 2017)
These phishing emails being used to steal credentials from critical infrastructure firms can silently harvest data without even using macros, warn researchers….

How I learned to stop worrying (mostly) and love my threat model (Risk Assessment – Ars Technica, Jul 08 2017)
Reducing privacy and security risks starts with knowing what the threats really are….

Millions of Verizon customer records exposed in security lapse (ZDNet, Jul 13 2017)
Customer records for at least 14 million subscribers, including phone numbers and account PINs, were exposed….

Leave a Reply

Your email address will not be published.