Category Archives: Featured

Early-stage cybersecurity investment flowing, despite pandemic

While most industries saw a significant dip in seed and Series A investments last year, cybersecurity investment remained resilient.

The post Early-stage cybersecurity investment flowing, despite pandemic appeared first on SC Media.

Continue reading

Posted in Cloud, Cloud Security, Featured, Innovation, Security News, Software and solutions | Comments Off on Early-stage cybersecurity investment flowing, despite pandemic

Sunspot malware scoured servers for SolarWinds builds that it could weaponize

Software company says 2 customer inquires, in hindsight, appear linked to supply-chain attack

The post Sunspot malware scoured servers for SolarWinds builds that it could weaponize appeared first on SC Media.

Continue reading

Posted in Application Security, DevOps, Featured, Malware, Security News, SolarWinds hack | Comments Off on Sunspot malware scoured servers for SolarWinds builds that it could weaponize

Perils of coding errors play out in Parler slip up

Applied to internet applications in general, the IDOR problems that led to the Parler exposure could extend to anything stored sequentially and not secured individually — receipts, posts, and in many instances entire accounts.

The post Perils of coding errors play out in Parler slip up appeared first on SC Media.

Continue reading

Posted in Application Security, Featured, Privacy, Security News, Social Media | Comments Off on Perils of coding errors play out in Parler slip up

Complexity and cost chip away at SOCs’ perceived return on investment

51% of 17,200 surveyed IT and security practitioners said that
their SOC’s ROI has gotten worse.

The post Complexity and cost chip away at SOCs’ perceived return on investment appeared first on SC Media.

Continue reading

Posted in Featured, Managed Security Services, Network Security, Research, Security News, SOC | Comments Off on Complexity and cost chip away at SOCs’ perceived return on investment

‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform

In theory they know better. But Users naïvely trust workplace communications platforms, despite phishing and impersonation threats.

The post ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform appeared first on SC Media.

Continue reading

Posted in Application Security, Featured, Phishing, Privacy, Security News | Comments Off on ‘I’ll Teams you’: Employees assume security of links, file sharing via Microsoft comms platform

SolarWinds hack is the perfect foreword to new book on history’s biggest breaches

SC Media spoke to author and former CISO Neil Daswani about his upcoming new book “Big Breaches: Cybersecurity Lessons for Everyone.”

The post SolarWinds hack is the perfect foreword to new book on history’s biggest breaches appeared first on SC Media.

Continue reading

Posted in Breach, Data Breach, Featured, Network Security, Security News | Comments Off on SolarWinds hack is the perfect foreword to new book on history’s biggest breaches

Legal recourse? Nissan balances competitive and security fallout from source code leak

News that source code of Nissan North America tools leaked online because of a misconfigured Git server spurs questions not only about potential cyberattacks by bad actors, but also whether competitors could use the sensitive data against the automobile giant.

The post Legal recourse? Nissan balances competitive and security fallout from source code leak appeared first on SC Media.

Continue reading

Posted in Breach, Data Breach, DevOps, Featured, Insider Threat, Security News | Comments Off on Legal recourse? Nissan balances competitive and security fallout from source code leak

The physical breach of the Capitol building opens a cybersecurity pandora’s box

The incident, as well as the response among those on Capitol Hill tasked with securing government technology assets, serves as a dramatic and evolving case study for public and private sector entities on the scope of the cybersecurity risk tied to a physical breach.

The post The physical breach of the Capitol building opens a cybersecurity pandora’s box appeared first on SC Media.

Continue reading

Posted in Breach, Data Breach, Data security, Featured, Government/Defense, Physical security, Security News | Comments Off on The physical breach of the Capitol building opens a cybersecurity pandora’s box

SolarWinds hack: Amid hardened security, attackers seek softer targets

Experts disagree that election security efforts detracted from supply chain security. But there are still lessons to be learned.

The post SolarWinds hack: Amid hardened security, attackers seek softer targets appeared first on SC Media.

Continue reading

Posted in Featured, Network Security, Security awareness, Security News, SolarWinds hack, Third-party risk | Comments Off on SolarWinds hack: Amid hardened security, attackers seek softer targets