SecurityWeek’s Enterprise Lockdown will allow attendees from around the world to immerse themselves in a virtual world to learn about and discuss the latest cybersecurity threats and challenges facing enterprise organizations. [Read More]
New rules require critical information infrastructure operators in China to conduct cybersecurity reviews when purchasing tech products and services. [Read More]
Kaspersky has teamed up with SecurityWeek for a three-day virtual event where researchers and other industry professionals will discuss malware, exploits, threat hunting, and other interesting topics. [Read More]
The GAO has analyzed the Pentagon’s cyber hygiene initiatives and found that they are incomplete and in some cases no one is keeping track of their progress. [Read More]
SecurityWeek announced the launch of Security Summits, a new virtual event series designed to allow participants from around the globe to immerse themselves in a virtual environment to discuss the latest cybersecurity threats and challenges facing enterprise organizations. [Read More]
When state election officials gathered ahead of the last presidential election, major topics were voter registration, identity theft and ballot design. This year, the main theme is election security. [Read More]
The U.S. Defense Department wants companies hoping to obtain defense contracts to demonstrate that they can keep sensitive information safe. [Read More]
A major exercise whose goal was to test the cyber and physical security of North America’s grid has enabled the energy industry and governments to review and improve incident response plans and collaboration. [Read More]
With the pandemic creating a massive remote work shift and consequent rises in cyber risk, finding individuals with cybersecurity skills is harder than ever.
Cyber range scenarios provide real insights into an organization’s capabilities and resilience against threats, along with the confidence to tackle them when they occur.
Cyber attackers long ago figured out that the easiest way for them to gain access to sensitive data is by compromising an end user’s identity and credentials.
We’ve seen an evolution from more traditional simulation exercises that use a Red Team to identify vulnerabilities and launch mock attacks and a Blue Team to detect and respond to attacks, to Purple Teaming exercises.
Writing and documenting aren’t the most exciting activities. But they have tremendous potential, both in improving security operations and incident response, as well as in opening up a constructive dialogue.
Attended by roughly 40,000 people, RSA Conference 2016 was the biggest ever. Here are some observations on security trends observed at the event that took place last week at the conference.