Posts Tagged ‘security’

Plan your career, analyst urges CISOs

Written by Howard Soloman for IT World Canada – September 24th, 2020 A lot of chief information security officers tell Forrester Research they didn’t plan on becoming CISOs after years of working in infosec jobs. It just happened, or they were “voluntold” for the post because no one else wanted it. That, says the Forrester principal analyst ...

Read More

Firefox bug lets you hijack nearby mobile browsers via WiFi

By Catalin Cimpanu for Zero Day | September 18, 2020 Mozilla says users should update as soon as possible to Firefox v79 for Android. Mozilla has fixed a bug that can be abused to hijack all the Firefox for Android browsers on the same WiFi network and force users to access malicious sites, such as phishing pages. ...

Read More

Spear-Phishers Leverage Office 365 Ecosystem to Validate Stolen Creds in Real Time

Written by Ericka Chickowski – September 11th, 2020 New attack technique uses Office 365 APIs to cross-check credentials against Azure Active Directory as victim types them in. Serving as yet another proof point of the creativity with which attackers are targeting Office 365 users with new phishing schemes, Armorblox researchers yesterday detailed a new attack technique they ...

Read More

Microsoft Security: What cybersecurity skills do I need to become a CISO?

Written by Abbas Kudrati – Chief Security Advisor, Microsoft Build the business skills you need to advance to Chief Information Security Officer. For many cybersecurity professionals, the ultimate career goal is to land a chief information security officer (CISO) job. A CISO is an executive-level position responsible for cyber risk management and operations. But cybersecurity is transforming. ...

Read More

Where Will the Cybersecurity Industry Be Post-Pandemic?

Written by www.cybersecurity-insiders.com Many people have weighed in about the new cyberthreats emerging due to the COVID-19 pandemic. They have useful insights, but it’s also valuable to take a forward-thinking approach and ponder what the cybersecurity industry will look like once this health crisis is finally over. Here are five likely outcomes. Companies Will Increasingly ...

Read More

The Impacts of COVID-19 On Cybersecurity

There is no doubt that the Cybersecurity Threat Landscape has always been an ever changing, dynamic one.  But with the advent of COVIDC 19, this picture has changed to magnitudes that nobody has ever imagined before.  For example, the virus originally started out in the Wuhan Province of China, and theories have speculated so far ...

Read More

What is PIM (Privileged Identity Management) and Why Do I Need It?

Azure Active Directory (Azure AD) is essentially an Identity Assessment Management (IAM) service that is based in the Cloud.  Through this mechanism, you can create specific user group roles for each department in your company. From there, you can then assign the appropriate levels of rights and permissions for all of the employees, so that ...

Read More

Federal Agencies Warn North Korean Hackers Have Upgraded Their Cash-Out Schemes

Written by Mariam Baksh – August 26th, 2020 A faction of North Korea’s General Reconnaissance Bureau associated with the methodical infiltration of financial institutions to steal money from around the world is back in action with improved capabilities, according to a technical advisory by the Cybersecurity and Infrastructure Security Agency, along with the Treasury Department, U.S. ...

Read More

New data from Microsoft shows how the pandemic is accelerating the digital transformation of cyber-security

Written by Andrew Conway General Manager, Microsoft Security - August 19th, 2020 The importance of cybersecurity in facilitating productive remote work was a significant catalyst for the two years-worth of digital transformation we observed in the first two months of the COVID-19 pandemic. In this era of ubiquitous computing, security solutions don’t just sniff out threats, ...

Read More

Cyber Readiness Checklist

Want to read the rest of the checklist? Go to www.kamind.com/ares-checklist-form to continue reading.  

Read More