Great "Defense-in-Depth" InfoGraphic

Michael Fisher shared this on Twitter. Very nice and gives an immediate overview of #CyberSecurity Defense-in-Depth with all the areas it encompasses. Here it is:
Continue Reading

Global Cyber Security spending to top $114bn in 2018, says Gartner

The need for improved detection, response and privacy is driving the demand for security products and services in response to security risks, business needs and industry changes, Gartner ...
Continue Reading

Why Don’t Your Employees Care About Cyber Security?

Whether you realize or not, your employees are a critical part of your layered defense against phishing attacks, malware, ransomware, and more. So why aren’t they concerned?
Continue Reading

Cyber Security Insurance: Underwriting Is Changing Because Of Billions Of Potential Exposure

Cybersecurity insurers, faced with growing demand, are looking for new ways to better measure their risks, says Aleksandr Yampolskiy, CEO of SecurityScorecard. So some are moving toward ...
Continue Reading

#2good2Btrue: Beware of Cyber Criminals Out To Ruin Your Holidays

Does that flash sale offer on a holiday package or last minute ticket sound too good to be true? Then it probably is. You might end up with a non-existent, fraudulent or cancelled ...
Continue Reading

Gone Phishing: Travelers Claims Plan Doesn’t Cover Cyber Losses

Daniel R. Stoller at Bloomberg Law had an excellent observation about the risks of phishing related to general crime policies. Here is a short excerpt and the whole article is warmly ...
Continue Reading

PDF Files Can Be Abused to Steal Windows Credentials

PDF files can be weaponized by malicious actors to steal Windows credentials (NTLM hashes) without any user interaction, and only by opening a file, according to Assaf Baharav, a security ...
Continue Reading

Why human vulnerabilities are a higher cyber security risk than software flaws

Jonathan Greig at TechRepublic wrote an article based on recent Proofpoint research: "According to cybersecurity firm Proofpoint, the 'vast majority' of digital attacks aimed to exploit ...
Continue Reading

Many of us will be at the RSA Conference in SanFran this week. Here are some quick tips!

Lance Spitzner said: Eat breakfast, it may be the last meal you get that day. Schedule the most important meetings in the morning. RSA gives you a back-pack. Don't use it at the con, ...
Continue Reading

Best-Funded US Cyber Security Startups By State [InfoGraphic]

We were just made aware of this very interesting map created by CBInsights. It lists the most well-funded cyber security companies in each US State as of Feb 2, 2018. To our pleasant ...
Continue Reading

Get the latest about social engineering

Subscribe to CyberheistNews