In an era of increasingly sophisticated security threats, CIOs, CISOs, and COOs alike need to be more committed than ever to protect their data, facilities, and teams.
U.S. Sen. Mark R. Warner (D-VA), Vice Chairman of the Senate Intelligence Committee and former tech entrepreneur, wrote to U.S. Customs and Border Protection (CBP) and South Korean company Suprema HQ, following separate but alarming incidents that impacted both entities and exposed Americans’ personal, permanently identifiable data.
During the Black Hat annual conference in Las Vegas August 3-8, 2019, Thycotic conducted research with nearly 300 attendees identifying either as “hackers” (49 percent) or “security professionals” (51 percent).
The lack of visibility into the expanded cloud attack surface is a fast-growing problem that is only getting worse. Although we have seen misconfigurations in the cloud before, the Capital One breach is a sobering reality check for the security industry. We need to vastly improve threat detection and response in cloud environments.
The number of cybersecurity attacks events measured from January through June was twelve times higher when compared with the same period in 2018, an increase largely driven by IoT-related traffic, according to the Attack Landscape H1 2019 by F-Secure.
Students from the University of Nevada – Reno prevailed against 5,026 students from 419 schools across the nation recognized as the top school in the nation during the National Cyber League (NCL) Spring 2019 season.
More than 10 years ago, I was deployed to Iraq as a U.S. Air Force intelligence analyst, assigned to the Joint Special Operations Command (JSOC) Task Force with one clear objective: disrupt terrorist activities by targeting and capturing al-Qaeda insurgents.