Several independently owned restaurants in the Quaker Steak & Lube chain announced their retail point-of-sale terminals were remotely accessed and infected with malware that captured customer payment…
Security
Industries Come Together To Practice Response For Cyber-Attacks
Key industry sectors undertake virtual wargames to prepare for cyber-attacks. CNBC cyber security reporter Kate Fazzini joined Task Force 7 Radio host George Rettas to discuss the value of recent exer…
Survey: Security Tops List Of Aerospace And Defense Developer Concerns
Software has become increasingly essential to aerospace and defense development. In a recent survey of more than 300 developers, the top concern cited by this industry’s developers is security. Read t…
Incident Of The Week: Leak Discloses UN Data Breach From 2019
Hackers broke into dozens of United Nations (UN) servers in July of last year, and UN officials kept quiet about it. The worst part? PII was stolen and employees were kept in the dark. Cyber Security…
Implementing Digital Transformation Without Stressing The Cyber Security Team
Cyber-attacks are a reality for every organization because of the increasing reliance on digital systems, application and processes. However, the security team cannot do its job alone. How can the ent…
The Immediate Impact Of AI In The Security Operations Center (SOC)
The impact of AI is already being felt in the enterprise organization. And no surprise, cyber-attackers are leveraging machine learning to carry out more sophisticated attacks. Is the tech mature enou…
Critical Communications For Enterprise Cyber Security Incident Response
With communication systems down from a cyber-attack, employees want to know how to conduct business. Organizations have disaster recovery plans for electrical outages. What can cyber security leaders…
Incident Of The Week: Misconfigured Servers Result In 250 Million Microsoft Cust…
A misconfiguration applied to five Elasticsearch database servers in December 2019 led to the exposure of 250 million customer support records for software maker Microsoft. How should less sophisticat…
World Economic Forum: 4 Reasons Why Passwords Are Becoming A Thing Of The Past
Password authentication has become a factor in poor customer retention, which leads to weak password management becoming a gift to cyber-criminals. Password-free authentication methods can improve cus…
5 Undeniable Reasons To Prioritize Enterprise IoT Security
The “Internet of Things” (IoT) is already a part of the enterprise, whether cyber security administrators are ready or not. Cyber Security Hub developed a market report that uncovers five reasons why…