Pictured: a building at Microsoft Corporation headquarters in Redmond, Washington. (Coolcaesar/CC BY-SA 4.0via Wikimedia Commons) Microsoft Teams is prone to the same phishing hazards, impersonation scams and privacy violations as email is, yet many users naïvely treat this and other workplace communications platforms with inherent trust. As a result, they often
Tag: security
Legal recourse? Nissan balances competitive and security fallout from source code leak
News that source code of Nissan North America tools leaked online because of a misconfigured Git server spurs questions not only about potential cyberattacks by bad actors, but also whether competitors could use the sensitive data against the automobile giant. Nissan offerings associated with the leaked source code ran the gamut
2021 strategy predictions: Shifts in business models, shifts in security priorities
As companies of all sizes prepare for more challenges tied to the pandemic, as well as an expected transition to a permanent hybrid workforce, security plans will need to adapt. So what kind of strategic shifts might we see in 2021? More sophisticated phishing campaigns will probably mean enhanced email
Cyber escape room locks in employees’ security awareness. But can SC Media beat the clock?
Originally, Living Security designed physical escape rooms, actually shipping suitcases of props to clients and even flying in hosts to train companies’ security program leaders how to run exercises across their organizations. But like so many other organizations, Living Security was forced to pivot after COVID-19 forced lockdowns last March.
Cloud security mapping startup Lightspeed comes out of stealth
An image of stratocumulus clouds from space. (ISS Expedition 34 CrewImage Science & Analysis Laboratory, NASA Johnson Space Center. Derivative work including grading, lens profile correction and noise removal. Julian Herzog, Public domain, via Wikimedia Commons.) A Thanksgiving turkey must be carefully prepared and cooked in just the right way, lest it
FireEye buys Respond Software as security automation market gains momentum
In the latest sign of the burgeoning security automation market, threat intelligence giant FireEye announced it has purchased Respond Software, a Mountain View, California startup that sells machine learning and automated, cloud-based investigation, detection and response services. Respond Software’s Extended Detection and Response (XDR) software will augment Mandiant Advantage, FireEye’s
Websites requiring security software downloads opened door to supply chain attack
The Seoul skyline in South Korea (Flickr – Laurie Nevayhttps://www.flickr.com/photos/laurienevay/, CC BY-SA 2.0 https://creativecommons.org/licenses/by-sa/2.0, via Wikimedia Commons). A newly reported supply chain attack involved malicious hackers compromising financial and government websites so they would deliver malware to unsuspecting visitors. The tactic demonstrates the risks involved with requiring users to download software
FTC orders Zoom to implement stricter security standards
Zoom must adhere to strict security standards to satisfy an agreement with the Federal Trade Commission, the commission announced Monday. The video conferencing company and an omnipresent fixture of the COVID-19 lockdowns has had a string of security controversies dating back to last year, including services it advertised, but
Fewer than 25 percent of companies deployed adequate security access control systems
A new survey found that fewer than 25 percent of companies have incorporated an active defense of their control systems and assets. The survey, released today by the Control System Cyber Security Association International (CS)2AI and KPMG, also found that 60 percent of companies didn’t know if they had a security
Browser isolation beta taps global infrastructure for online app security
Whether it’s email, collaborative tools like Slack or Teams, or project management software, many of the most commonly used workplace applications today are accessed through a web browser. While that’s made it easier for many employees to seamlessly access their work tools, it’s also expanded the surface area for a number