Saturday, November 23, 2024
Cybersecurity News
Industry News
Webinars
Topics
About
Sponsor
Cybersecurity News
Industry News
Webinars
Topics
About
Sponsor
Combing the world for the cybersecurity stories you need to know.
Cybersecurity News
Are Your Cybersecurity Budgets Misaligned? A New Approach to Spending Smarter
October 17, 2024
As technology and cybersecurity continue to evolve, it is important for organizations to adapt their budgets over time. What may have been cutting-edge protection five years ago can be ineffective, inefficient, or downright obsolete today.…
Read More >
From Phishing to Deepfakes: The New Face of Social Engineering
October 16, 2024
For decades, phishing attacks have been the bread and butter of cybercrime. Most of us have encountered the familiar signs—an email with a suspicious link or a message from a “bank” urgently asking for your…
Read More >
The Cybersecurity Burnout Crisis Is Reaching The Breaking Point
October 15, 2024
The cybersecurity industry is facing a burnout crisis, with professionals increasingly overwhelmed by relentless threats and high-stakes responsibilities. Many cybersecurity teams are stretched thin, leading to stress, fatigue, and a higher turnover rate, which in…
Read More >
Cybersecurity In The Election Cycle: How To Stay Safe And Avoid Scams
October 15, 2024
As the election cycle approaches, cybersecurity threats targeting both voters and election systems are increasing. Key tips for staying safe include safeguarding personal information, identifying phishing scams, and staying aware of misinformation campaigns. Vigilance in…
Read More >
Oil and Gas Firms Aware of Cyber Risks
October 14, 2024
Moody’s latest report highlights strong cybersecurity awareness in the energy sector, with 90% of companies having dedicated staff and a quarter linking CEO pay to cybersecurity goals. However, only 67% conduct regular backups, exposing a…
Read More >
Robust Cloud IAM Should Align to Zero-Trust Principles
October 11, 2024
Aligning cloud identity and access management (IAM) with zero trust principles is crucial for ensuring robust security. This approach emphasizes continuous verification of users and devices, minimizing reliance on perimeter-based defenses. Zero trust in cloud…
Read More >
Cybersecurity Awareness Lags as Global Workforce Engages in Risky AI Practices
October 11, 2024
The "Cybersecurity Attitudes and Behaviors Report" explores how individuals' perceptions and actions influence cybersecurity risks. It reveals gaps in understanding and security practices, with many users exhibiting risky behaviors despite being aware of threats. The…
Read More >
The Internet Archive Breach: Over 31 Million User Accounts Exposed
October 11, 2024
The Internet Archive recently experienced a security breach that exposed user account information, including email addresses and hashed passwords. Although the passwords were not stored in plain text, users are encouraged to update their credentials…
Read More >
Why AI is Both Your Best Defense and Biggest Threat
October 10, 2024
Artificial intelligence and machine learning (AI/ML) are sophisticated technologies that organizations and individuals alike can use to their advantage. In recent years, the increasing availability and popularity of generative AI tools like ChatGPT has put…
Read More >
AI Dominates Key Technologies and Practices in Cybersecurity and Privacy
October 10, 2024
Artificial intelligence (AI) is emerging as a dominant force in cybersecurity and privacy, driving innovations in threat detection, response automation, and risk management. Key AI technologies include machine learning for identifying threats and privacy-enhancing techniques…
Read More >
Much More than Money: The Far-Reaching Costs of Cyber Breaches
October 09, 2024
Cyber breaches carry far-reaching consequences beyond financial losses, including reputational damage, operational disruptions, and legal liabilities. The ripple effects of a breach can affect customer trust, employee morale, and long-term business growth. Organizations must invest…
Read More >
Ransomware Threat Groups are on the Rise, So Be on Your Guard
October 09, 2024
Ransomware groups are becoming more prevalent and increasingly sophisticated, targeting organizations with advanced attacks. These cybercriminals exploit vulnerabilities to demand ransoms in exchange for restoring access to data. To counter this growing threat, experts recommend…
Read More >
How To Communicate Cybersecurity More Effectively To The Board
October 08, 2024
Effectively communicating cybersecurity to the board requires simplifying complex issues, aligning cybersecurity risks with business objectives, and using clear metrics to illustrate the potential impact of cyber threats. It’s essential to frame cybersecurity as a…
Read More >
Secureworks: Ransomware Takedowns Didn't Put Off Cyber Criminals
October 08, 2024
Despite recent takedowns of ransomware operations, cybercriminals remain undeterred, according to Secureworks. The report highlights that ransomware groups continue to adapt, changing tactics to evade law enforcement efforts. Secureworks also notes that although some criminal…
Read More >
New Era of Cyber Attacks Requires a Multi-layered Security Strategy for Schools
October 08, 2024
As cyberattacks on schools become more frequent and sophisticated, educational institutions are urged to adopt a multi-layered security strategy. This approach involves using a combination of technology, staff training, and security policies to protect sensitive…
Read More >
LockBit Arrests and Sanctions
October 07, 2024
Recent arrests and sanctions related to the LockBit ransomware group have disrupted their operations, highlighting the international effort to combat cybercrime. Law enforcement agencies have targeted key members and imposed sanctions to limit their ability…
Read More >
Timeline: 15 Notable Cyberattacks and Data Breaches
October 07, 2024
The overview discusses 15 prevalent cybercrimes affecting individuals and businesses, including ransomware, phishing, and identity theft. These cybercrimes exploit security vulnerabilities, often leading to data breaches, financial losses, and reputational harm. As threats continue to…
Read More >
The Growing Importance Of Cybersecurity In Mergers And Acquisitions
October 07, 2024
As cybersecurity risks continue to grow, their importance in mergers and acquisitions (M&A) is increasing. Companies must now assess not only the financial and legal aspects of deals but also the cybersecurity vulnerabilities of the…
Read More >
Subscribe for the Latest News
"
*
" indicates required fields
First Name
*
Last Name
*
Company Name
*
Job Title
*
Email
*
Country
*
Country *
United States
Afghanistan
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius and Saba
Bosnia and Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cabo Verde
Cambodia
Cameroon
Canada
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos Islands
Colombia
Comoros
Congo
Congo, Democratic Republic of the
Cook Islands
Costa Rica
Croatia
Cuba
Curaçao
Cyprus
Czechia
Côte d'Ivoire
Denmark
Djibouti
Dominica
Dominican Republic
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard Island and McDonald Islands
Holy See
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Japan
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Democratic People's Republic of
Korea, Republic of
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libya
Liechtenstein
Lithuania
Luxembourg
Macao
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia
Moldova
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestine, State of
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Romania
Russian Federation
Rwanda
Réunion
Saint Barthélemy
Saint Helena, Ascension and Tristan da Cunha
Saint Kitts and Nevis
Saint Lucia
Saint Martin
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Sint Maarten
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Spain
Sri Lanka
Sudan
Suriname
Svalbard and Jan Mayen
Sweden
Switzerland
Syria Arab Republic
Taiwan
Tajikistan
Tanzania, the United Republic of
Thailand
Timor-Leste
Togo
Tokelau
Tonga
Trinidad and Tobago
Tunisia
Turkmenistan
Turks and Caicos Islands
Tuvalu
Türkiye
US Minor Outlying Islands
Uganda
Ukraine
United Arab Emirates
United Kingdom
Uruguay
Uzbekistan
Vanuatu
Venezuela
Viet Nam
Virgin Islands, British
Virgin Islands, U.S.
Wallis and Futuna
Western Sahara
Yemen
Zambia
Zimbabwe
Åland Islands
Employee Count
*
Employee Count *
< 100 employees
100 to 249 employees
250 to 499 employees
500 to 999 employees
1,000 to 2,499 employees
2,500 to 4,999 employees
5,000 to 9,999 employees
10,000 to 24,999 employees
25,000+ employees
Industry
*
Industry *
Advertising & Marketing
Agriculture
Airlines & Aerospace (including Defense)
Automotive
Business Support & Logistics
Construction, Machinery and Homes
Education
Entertainment & Leisure
Finance & Financial Services
Food & Beverages
Government
Health Care & Pharmaceuticals
Insurance
Manufacturing
Nonprofit
Real Estate
Retail & Consumer Durables
Telecommunications, Technology, Internet & Electronics
Utilities, Energy, and Extraction
Other
Consent
*
I have read and agree to the Security Buzz
Privacy Policy
and understand that I may receive communications from Security Buzz and its partners by submitting this form.
*
Name
This field is for validation purposes and should be left unchanged.
Webinars
Thursday, Dec. 5
2pm ET / 11am PT
Why the legacy approach to application security is failing
Thursday, Jan. 23
1pm ET / 10am PT
Bridge the Cybersecurity Skills Gap with Managed Security Services