Articles

The realistic approach to security is that incidents occur. While ideally, the CISO would want to prevent all of them, in practice, some will succeed to a certain degree—making the ability to efficiently manage an incident response process a mandatory skill for any CISO. Moreover, apart from the management of the actual response process, the CISO must also be able to efficiently communicate
Source de l’article sur The Hacker News

Emotet, the notorious trojan behind a number of botnet-driven spam campaigns and ransomware attacks, has found a new attack vector: using already infected devices to identify new victims that are connected to nearby Wi-Fi networks. According to researchers at Binary Defense, the newly discovered Emotet sample leverages a « Wi-Fi spreader » module to scan Wi-Fi networks, and then attempts to
Source de l’article sur The Hacker News

Whether you’re moving your company’s repository to the cloud or updating an IT infrastructure, securing data from sneaky malware attacks is crucial. According to a report on cybercrime by Accenture, the number of security breaches faced by businesses has increased by 11% since 2018. 

The losses suffered are substantial in terms of cost and information. In this climate, increasing technological advancements and 5G communication could simplify how attackers breach an organization’s security systems. 

Source de l’article sur DZONE

It may sound creepy and unreal, but hackers can also exfiltrate sensitive data from your computer by simply changing the brightness of the screen, new cybersecurity research shared with The Hacker News revealed. In recent years, several cybersecurity researchers demonstrated innovative ways to covertly exfiltrate data from a physically isolated air-gapped computer that can’t connect wirelessly
Source de l’article sur The Hacker News

Exams are pretty important in professional IT. You can have all the practical knowledge in the world, but technical recruiters want to see certificates. If you want to improve your resume, the Complete 2020 IT Certification Exam Prep Mega Bundle will help you ace nine of the most important exams. You can pick up the training now for only $39 via THN Deals. Over the next few years, the areas
Source de l’article sur The Hacker News

This week, we take a look at where API security is at on Gartner Hype Cycle, what the threatscape for 2020 looks like according to McAfee, and a SANS Institute whitepaper on DevSecOps.

Analysts: API Security in Gartner Hype Cycle

Gartner published their Hype Cycle for Application Security, 2019 a few months ago. The Hype Cycle provides a graph on where we are in application security in terms of the maturity of technologies and their adoption; what is up and coming and what is already established.

Source de l’article sur DZONE

This week, the OAuth 2.0 Token Exchange got its RFC, and there is an upcoming webinar on JWT. In addition, we take a look at where to start with securing your APIs, and how 2020 seems to be shaping up according to analysts.

Standard: OAuth 2.0 Token Exchange

IETF has published the RFC 8693 for OAuth 2.0 Token Exchange.

Source de l’article sur DZONE

Cybercrime is on a steady rise and drastically impacts every industry imaginable. According to the Internet Crime Complaint Center of the FBI, cybercriminals cost consumers and business owners 2.7 billion dollars in losses in 2018

Couple that alarming statistic with the fact that CyberCrime Magazine predicts there will be 3.5 million unfilled cybersecurity jobs in 2021. Due to the shortage of cybersecurity personnel, many developers, hobbyists, and business owners are trying to proactively learn about security threats so they can keep their hard work safe. 

Source de l’article sur DZONE

Thinking of a master DevSecOps plan…

Whether it was the millions of users left vulnerable by Fortnite, or hackers gaining access to Dunkin’ customer accounts, 2019 has already seen some of the worst data breaches to date. To combat these types of attacks and vulnerabilities, organizations must be more cognizant of their security, and embrace a DevSecOps approach. And to do so, it is imperative that they provide the proper education and training for every facet of the organization.

You may also enjoy:  10 DevSecOps Implementation Principles

But it is important to note when educating organizations about security that some practices and technologies should be encouraged, while others should be avoided. These teachings need to be tailored for different audiences as needed, and new ways of learning and fitting into a DevSecOps scope should be explored in great detail.

Source de l’article sur DZONE

With the vast amount of internet fraud, security breaches, and digital crime, the call to fortify your key business data has never been louder!

Well, the world wide web is not what it used to be. As businesses grow globally, and more business infrastructures are connected, cybercriminals have come to realize the importance of the data that organizations are protecting. Also, the recent surge in technological advancement has made everyone from solopreneurs to large scale firms more vulnerable to attacks now more than ever.

Source de l’article sur DZONE