Why IaC Security Should Matter to CISOs
Explore how secure infrastructure-as-code (IaC) enables security leaders to help DevOps teams quickly deliver more business value.
Explore how secure infrastructure-as-code (IaC) enables security leaders to help DevOps teams quickly deliver more business value.
Credit to Author: Pieter Arntz| Date: Mon, 28 Feb 2022 21:58:25 +0000
The UK’s data watchdog has issued a reprimand to both the Scottish government and NHS National Services Scotland about their COVID Status app
The post Covid app’s privacy information ruled not clear enough appeared first on Malwarebytes Labs.
Read more
In part two of this blog entry, we further investigate the innings of smspva.net and discuss the impact and implications of such services.
Credit to Author: Paul Ducklin| Date: Mon, 28 Feb 2022 17:56:20 +0000
Instagram scams don’t seem to be dying out – we’re seeing more variety and trickiness than ever…
Read moreCredit to Author: Emma Jones| Date: Mon, 28 Feb 2022 17:00:00 +0000
These are exciting and demanding days for organizations adapting to hybrid work realities, including a wider distributed workforce and more rapid change in employee roles. These dramatic shifts drive business resilience and upside in a world still coping with pandemic disruptions.
The post How Microsoft can help reduce insider risk during the Great Reshuffle appeared first on Microsoft Security Blog.
Read moreFortinet’s FortiGuard Labs team has assembled a readiness checklist focused on standard cyber hygiene and more to help in fighting against destructive cyber threats. Read to learn more.
Read moreThe Sightings Report based on research run by MITRE CTID in collaboration with organizations such as FortiGuard Labs analyzes attacks and provides contextual, actionable threat intelligence. Read more about how this report can help.
Read moreCredit to Author: Malwarebytes Labs| Date: Mon, 28 Feb 2022 16:55:48 +0000
This week on Lock and Code, we discuss Crisis Text Line’s data-sharing agreement with its for-profit partner, which has upset many people.
The post How Crisis Text Line crossed the line in the public’s mind: Lock and Code S03E05 appeared first on Malwarebytes Labs.
Read moreCredit to Author: Susan Bradley| Date: Mon, 28 Feb 2022 06:09:00 -0800
As Russia invaded Ukraine, seeing the disruption in the world occur in near real time on social media brought poignancy to what was happening. While I don’t know anyone in Ukraine, I know many people who have friends or family members that have been impacted by the war. Ukraine has many technology ties around the world. It’s also been a source of cyberattacks, which is why there’s extra concern about what we can do to protect ourselves in case of attack. (Eastern Europe has often been the source of many of the ransomware attacks that occur around the world.)
So what can tech users do to ensure you protect yourself from possible cyberattacks arising from the conflict?
Credit to Author: Louise Matsakis| Date: Mon, 28 Feb 2022 12:00:00 +0000
From false press releases to misleading domain names, one man has allegedly gone to great lengths to sabotage his competitors.
Read more