Amazon Web Services (AWS) on Tuesday announced the general availability of Security Hub, a service that aggregates and prioritizes alerts from AWS and many third-party security tools.
Survey of security professionals reveals that almost two thirds have considered leaving their jobs or the industry all together. So who will fill the gap?
Bill would also force large tech companies to disclose what user data they collect and how they're monetizing it.
Researchers find new OSX/Linker malware abusing still-unpatched macOS Gatekeeper bypass.
22 hours ago What the cell...? Telcos around the world were so severely pwned, they didn't notice the hackers setting up VPN pointsThe Register View Synopsis+1
Cybereason lifts lid on highly sophisticated long-running espionage campaign targeting phone carriers
Hackers infiltrated the networks of more than ten cellular telcos around the world, and remained hidden for years in some cases, as part of a long-running tightly targeted surveillance operation, The Register has learned.…
Microsoft is adding a protected section to its cloud storage.
A former congressional staffer was sentenced to four years in prison Wednesday after pleading guilty to illegally posting online the home addresses and telephone numbers of five Republican senators who backed Brett Kavanaugh's Supreme Court nomination.
US Reportedly Responded to Drone Downing With Cyber StrikeIran is increasing its malicious cyber activity against the U.S, which could manifest in attacks that render computers unusable, a top U.S. cybersecurity official says. The warning comes after the U.S. reportedly targeted Iranian computer systems in response to the downing of a surveillance drone.
50 roles shifted off to India
DXC Technology is sending hundreds of security personnel from the America's division down the redundancy chute and offshoring some of those roles to low-cost centres, insiders are telling us.…
Your biometric information will continue to be captured and the trade off is efficiency.
SaaS applications are supplanting traditional desktop software, and visibility into cloud workloads is a major problem, according to Symantec.
Complaint claims rival Tanium's hires took deal data with them
McAfee is suing former senior salespeople whom it alleges stole company trade secrets when they moved to a rival security vendor.…
Senator Says Current Methods Offer Inadequate ProtectionsU.S. Sen. Ron Wyden, D-Ore., is urging the National Institute of Standards and Technology to create new standards and guidelines for individuals and organizations to securely share sensitive documents online. He contends current security measures are inadequate.
15 minutes ago Stop us if you've heard this one: US government staff wildly oblivious to basic computer, info security safeguardsThe Register View Synopsis+1
Now for deep-diving Congress hearings... LMAO JK JK they will do nothing
A US Senate probe has once again outlined the woeful state of computer and information security within Uncle Sam's civil service.…
Over 2,000 devices have been bricked in the span of a few hours. Attacks still ongoing.
7 hours ago Why data breaches keep happeningTechRepublic View Synopsis+1
Data breaches remain prevalent in the enterprise. Learn what companies are doing right--and wrong--when it comes to prevention.
7 hours ago Risk and Resilience: Finding the Right BalanceInfoRiskToday View Synopsis+1
Finding the right balance between risk and resilience is a challenge for every cybersecurity project - especially in the aerospace, space and defense sectors - and that's why such efforts must be driven by CISOs and CIOs, says Leonardo's Nik Beecher.
The new VPC traffic mirroring feature is one of multiple cloud and networking security announcements from AWS this week.
Cybercriminals are increasingly using shimmers instead of skimmers in attacks targeting automated teller machines, Flashpoint reports.
New report shows that poor data structure seems to be a significant barrier at many organizations.
10 hours ago Tales From the SOC: Healthcare EditionSecurityWeek View Synopsis+1
Over the past ten years, I have led and supported incident response engagements across nearly every industry vertical and trained security teams of all sizes to develop and improve their detection and response capabilities. One of the first areas addressed in these trainings is understanding whether an attack is targeted or opportunistic.
China-Linked Hackers Have Breached Deep Inside Teleco Providers and Have Complete Control of Data and Networks
11 hours ago How to custom a template in EnpassTechRepublic View Synopsis+1
Enpass allows you to create your own custom templates for even more efficient usage.
Following a series of incidents in which packages were misrouted, and under increasing scrutiny from the Chinese government, FedEx is seeking relief.