cybersecurity

  1. Man

    Challenges to Success: The Main Obstacles to a Career in Cybersecurity

    Cybersecurity is one of the fastest growing and most sought-after areas in the IT industry. However, despite the high attractiveness of this career, professionals face a number of difficulties that can become obstacles to success. Overcoming these barriers requires not only persistence, but also...
  2. Man

    AccountGuard: African countries have become a bastion of cybersecurity thanks to Microsoft

    Political and human rights organizations receive unexpected protection from digital intrusions. Microsoft has published a new Digital Defense Report on cyber threats emanating from states. According to the report, among the most vulnerable sectors of cyberattacks are IT, educational and...
  3. Man

    Japan Is Developing Digital Weapons: A Constitution Against Cybersecurity

    The new cabinet has postponed critical measures to ensure the country's security. The Japanese government's planned bill to strengthen cybersecurity is unlikely to be presented before the end of the year - the process has stalled after the change of prime minister and the defeat of the ruling...
  4. Man

    PT Rules: An Open Platform for Global Cybersecurity

    Positive Technologies has launched an open-source project for proactive detection of cyberthreats. Positive Technologies has launched PT Rules, an open-source project for the international community of information security (IS) specialists. The main goal of the project is to share the developed...
  5. Man

    $52 million and 20 years under surveillance: Marriott pays for weak cybersecurity

    The FTC is forcing Marriott to reconsider its policy after years of data protection breaches. Marriott International and its subsidiary Starwood Hotels will pay $52 million and create a comprehensive information security program to settle cases of large-scale data breaches from 2014 to 2020...
  6. Friend

    US cybersecurity: the split between the Pentagon and Congress is deepening

    The US Department of Defense rejects the reform of cyber structures. The U.S. Department of Defense has asked lawmakers to reject a proposal to conduct an independent assessment of the creation of a separate cyber unit in the military. The request was sent to the House and Senate Armed Services...
  7. Friend

    Cybersecurity on Wheels: U.S. Closes Doors to Foreign Technology

    The Department of Commerce is preparing revolutionary regulations for the auto industry. The US Department of Commerce plans to unveil new rules prohibiting the use of Chinese and Russian equipment and software for connected cars, Bloomberg reports, citing sources familiar with the situation...
  8. Carding Forum

    ECB tested cybersecurity of more than 100 European banks

    The regulator has identified weaknesses in the protection of financial institutions. The European Central Bank (ECB) has completed a large-scale stress test of the cybersecurity of European banks, which began in January 2024. The regulator checked the readiness of financial institutions to...
  9. Tomcat

    Vladimir Yevtushenkov and Yuri Maksimov launch a joint venture in the field of cybersecurity

    The new company will be engaged in product development and develop the service business. Vladimir Yevtushenkov, founder and largest shareholder of Sistema, and Yuri Maksimov, founder of the Group Positiv holding, plans to establish a joint venture in the field of cybersecurity. This company...
  10. Tomcat

    True horror: cybersecurity in the automotive industry

    The auto industry took its first step into the digital age back in 1967, when the Volkswagen Typ 3 was released in Germany with the D-Jetronic electronic injection system from Bosch. Today, computer systems control almost all functions of most cars - from engine operating modes to windshield...
  11. Tomcat

    Cybersecurity specialists have created a skimmer detector – SkimReaper

    This is what an anti-skimmer developed by representatives of the University of Florida looks like. A researcher from the University of Floridapresented the results of his large-scale project to develop skimmer detection systems at the USENIX Security Symposium. We are talking about spy readers...
  12. Father

    IntelBroker hacked the cybersecurity giant and put the obtained data up for sale

    Confidential logins, SMTP access, password keys, certificates, and much more were stolen. In the information space, there were reports of a serious cyber incident. The hacker, known under the pseudonym "IntelBroker", claims that he managed to penetrate the systems of one of the world's leading...
  13. Father

    10 of the largest U.S. cybersecurity companies

    Employees work from home, and many of them do it all the time. Apps are moving to the cloud at an accelerated pace. Today, corporate security is all about secure remote access and protecting cloud resources. This means that enterprises need to deploy SD-WAN, Secure Access Service Boundary...
  14. Father

    EDR systems as an example of the development of cybersecurity tools

    Malicious systems and technologies of cyber attacks appear quite often. Every month, new vulnerabilities are identified in different products, information appears about new ways to attack companies ' IT infrastructure, and new malware and other hacking software are created. The development of...
  15. Father

    Cybersecurity risk insurance

    Insurance has long been a common practice in global cybersecurity practices. Cyber risk insurance services are provided by both specialized companies and large international insurance organizations. At the same time, the practice of cyber insurance in Russia is quite rare, despite the presence...
  16. Father

    Slacker or Superhacker: Stereotypes about Cybersecurity Specialists

    The appearance of stereotypes about certain professions is largely due to the peculiarities of human thinking. It is always easier to accept some "established" views than to independently understand a particular phenomenon and draw conclusions. As applied to information security specialists...
  17. Father

    Artificial intelligence – the future of cybersecurity

    Artificial intelligence and machine learning (Machine Learning Methods) are actively penetrating all areas related to high technologies, and information security is no exception. The development of digital technologies and digitalization in general entails not only an increase in the number of...
  18. Father

    What is MITRE ATT&CK and what role does it play in the field of cybersecurity

    With the growth of information security threats, it is increasingly important to understand the tactics, methods and procedures used by attackers to carry out cyber attacks. Therefore, MITRE ATT&CK is of particular importance. We tell you what the MITRE ATT&CK matrix is and what role it plays in...
  19. Father

    Indian bank banned from opening new accounts due to weak cybersecurity

    How did investors react and will the bank continue to operate? The Central Bank of India has banned Kotak Mahindra Bank from registering new customers through online services and apps. The measures were taken after "serious deficiencies were identified" in the management of IT systems...
  20. Father

    Behind the Scenes of Cybersecurity: what are Fortinet, JetBrains, and Microsoft hiding?

    Positive Technologies presented the top trending vulnerabilities for March. In March 2024, Positive Technologies identified five more vulnerabilities as trending.: These are vulnerabilities that have already been used in cyber attacks and those that are expected to be exploited in the near...
Top