You searched for cyber | Page 3 of 4 | SC Media

Your search for cyber returned 37 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 30 days remove

Your search for cyber returned 37 results

Sort Results:

Relevant Recent
Perspectives

Why companies need to lock down IoT systems

During the last few years, malicious IoT hacks have grown exponentially with no immediate signs of slowing, while hackers relentlessly pursue new and creative ways to attack and exploit organizations. According to the FBI, within the past six years, attackers have amassed $144 million in ransomware payments alone – and each new attack costs more…
APTs/cyberespionage, Cybercrime, Government, Government/Defense, IoT, Malware, Security News

U.S. urges Linux users to secure kernels from new Russian malware threat

Linux users should not assume they are safe from the ambitions and reach of reputed Russian hacking group Fancy Bear, which has been using a newly disclosed malware toolset to establish a command-and-control connection with infected Linux systems. Called Drovorub, the toolset essentially creates a backdoor that enables file downloads and uploads, the execution of…
APTs/cyberespionage, Government, Government/Defense, Security News

FBI opens China-related counterintelligence case every 10 hours

FBI Director Christopher Wray today offered the House Homeland Security Committee some sobering news about China – the FBI opens a new China-related counterintelligence case roughly every 10 hours. Wray said of the nearly 5,000 active FBI counterintelligence cases underway across the U.S., almost half are related to China. He said China aims to compromise…
Data Breach, Patch Management, Patch/Configuration Management, Security News

What’s really changed three years after Equifax breach?

Are organizations better off today than they were three years ago when a devastating breach at Equifax exposed sensitive customer data and poor security practices in equal measure? The consensus among experts is that companies still have a ways to go. “Unfortunately, not much has changed,” said Greg Foss, senior threat researcher from VMware Carbon…
Encryption/Data Security, Security News

China pushes new global data security initiative, decrying US ‘politicizing’ the issue

China announced a comprehensive global data security program Tuesday, proposing many of the same international norms agreed upon by Western nations already, while protecting China’s interest in balkanizing the internet. State Councilor and Foreign Minister Wang Yi proposed the “Global Data Security Initiative” in a statement translated here by the New America think tank. According…
Product Review

Barracuda CloudGen Firewall F280 v8.03

Barracuda CloudGen Firewall F280 identifies and blocks advanced evasion and obfuscation tactics, enhancing network security with comprehensive and real-time network protection. This multi-layered security product examines packets as they are passed and opened and then cross-references protocol-compliant packages with defined firewall rules. The high performance, stateful, deep packet inspection engine protects against a broad range…
Sponsor Content

How to cybersecurity: Pain in the *AST

What’s the difference between IT security and application security? And what do all those acronyms mean? Learn more in our quick cyber security primer. In many organizations, software security responsibility is divided between IT security and application security. At the most fundamental level, IT security is about buying software, while application security is about building…
electric power
APTs/cyberespionage, Security News

Is the electric grid closer to a devastating cyberattack that could mean lights out?

Could the electric grid really be taken down with a $50 device secreted in the bottom of a coffee cup as some researchers have claimed? Perhaps. But the more likely threat comes from bad actors with markedly improved capabilities who’ve ramped up their attacks on critical infrastructure and utilities. Consider that 70 percent of industrial…
Next post in RiskSec 2020