SonicWall has issued an "urgent security notice" warning customers of ransomware attacks targeting unpatched end-of-life (EoL) Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products.
Capable cybersecurity professionals can expect to be spoiled for choice in the job market today and well compensated for their in-demand skillsets. For those considering entering the field, I’d like to lay out the state of security today, explore potential career paths, and provide some guidance on the steps you can take, including skills you can develop to make it happen.
Salt Labs researchers investigated a large financial institution’s online platform that provides API services to thousands of partner banks and financial advisors. As a result of multiple API vulnerabilities, researchers were able to launch attacks where:
How often do you consider gravity? And the power of this invisible force to move oceans, hold planets in orbit, and quite literally, keep us all grounded. Now, how about women in technology? Another force of nature that, I think, deserves more visibility and recognition. Men haven’t cornered the market on technological genius, innovation, and invention. But too often, women have had to work all the harder not only to prove that fact, but also to be equally recognized for their extraordinary contributions.
I dare to say this: “companies need to stop playing the game of pin the blame on the developer whenever a security vulnerability is discovered or exploited in applications.” Rather than pointing fingers at developers, organizations need to empower these professionals to help them build and expand their cloud-based initiatives without having to worry about security.
Fashion retailer Guess recently announced a data breach that compromised 1,300 people and their information, including account numbers, debit and credit card numbers, social security numbers, access codes and personal identification numbers.
Digital Shadows published new research revealing that in the last four months, each of its clients experienced on average 360 domains impersonating their company and brand name – nearly 1,100 per year, on average.
Morgan State University’s (MSU) Cybersecurity Assurance and Policy (CAP) Center has been awarded a $3.2 million National Science Foundation (NSF) grant to implement the agency’s novel CyberCorps Scholarship for Service (SFS) program at Morgan, providing 24 cybersecurity scholarships to undergraduate and graduate students.
Lack of visibility (39%) is the biggest challenge for security leaders who aim to maintain security and compliance across all business communications, according to a new SafeGuard Cyber study.
Traditional cybersecurity training can be individual or LMS-based and generally hinges on a 30- to 60-minute session of basic training once a year. There will be some visual reminders taking the form of emails or posters during the year. But regardless of the minor variations, traditional training doesn’t work.