You searched for cyber | SC Media

Your search for cyber returned 41 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 3 months remove
Bradley Barth remove

Your search for cyber returned 41 results

Sort Results:

Relevant Recent
Government, Health Care, Network Security, Research, Security News

Socioeconomic status and cyber: the new ‘digital divide’

In part one of a two-part series, SC Media examines how businesses and institutions in poorer or underserved regions may be less equipped to fight off cyberattacks than their well-funded counterparts in affluent cities.
Featured, Security News

The cyber digital divide: How to level the playing field

In the words of Phil Reitinger, president and CEO of the Global Cyber Alliance: “Cybersecurity needs to be a basic human right." In part two of this two-part series, we examine ways to better serve the underserved, economically challenged communities.
APTs/cyberespionage, Cybercrime, Security News

Hacker-for-hire groups profit by commoditizing APT tactics

In the span of just over three months, researchers have exposed three mercenary, “hacker-for-hire” groups engaging in industrial espionage and stealing corporate secrets for profit. Despite using tactics, techniques and procedures that are more typical of a nation-state ATP group, these threat actors –  Dark Basin, DeathStalker and an unnamed third entity group detailed late last month by Bitdefender –…
Events, InfoSec World 2020, Network Security, Security News

Union Pacific tracks cyber risk via its own probability modeling methodology

Rick Holmes, assistant VP and CISO at Union Pacific Railroad, detailed at InfoSec World 2020 how the transportation giant incorporates cybersecurity risk into its larger enterprise risk management process in order to help senior executives estimate losses caused by potential cyber incidents and make better decisions on where to invest in defenses. “We think that…
Security News

Winning business: CISOs chime in on the cyber vendor ‘dating game’

What sales tactics actually work? In light of a new study that dissects the various marketing tactics used to get the attention of security executives, SC Media asked four high-ranking security professionals for their biggest likes – and their biggest turn-offs – when getting wooed by vendors with their wares. Here’s what they said what…
Network Security, Research, Security News

CISOs value peer advice most when researching cyber solutions

A majority of surveyed CISOs said that when shopping for cybersecurity vendor solutions, they value input from their peers first and foremost – more than analyst reports, vendor content or any other source of information, according to a newly published research. A joint project of communications agency Merritt Group and technology and Tech Exec Networks…
Cybercrime, Data Breach, Ransomware, Security News

History shows, transparency can ease the fallout from a cyberattack

Cybersecurity firms have a responsibility to keep their clients safe from digital attacks. But when they end up the victims, they potentially risk losing credibility with these customers, especially if their operations are disrupted. It’s a potentially juicy extortion scenario for attackers, and we just saw an example of this play out last week when…
APTs/cyberespionage, Cybercrime, Government, Government/Defense, Phishing, Security News

Australia says state-based actor is behind surge of sophisticated cyberattacks

Australian Prime Minister Scott Morrison warned late last week that a sophisticated, state-sponsored cyber actor has been attacking the country’s government and corporate institutions, as well as critical infrastructure operators, with increasing regularity. Morrison did not name-and-shame the specific country that is responsible for the alleged attacks. But inside sources told Reuters that China is…
APTs/cyberespionage, Cybercrime, Featured, Malware, Security News

Threat hunters watch as Chinese hackers forage forums for tools

Mike McLellan, senior security researcher at Secureworks, talks about the discovery and investigation of one recent Chinese attack campaign that revealed how nation-state actors will leverage any code at their disposal.
Next post in APTs/cyberespionage