"As we continue to push the boundaries of what's possible with AI in cloud services, it's crucial to remember that security isn't just a checkbox—it's a fundamental pillar of innovation." Read more in this featured guest post from Gil Geron, CEO and Co-Founder of Orca Security: https://lnkd.in/gM8y94fM
Enterprise Security Tech / The Cyber Jack Podcast
互联网出版
Enterprise Security Tech is a cybersecurity blog for CISOs, CIOs, security-minded CEOs, and IT security pros.
关于我们
Enterprise Security Tech is a cybersecurity blog for CISOs, CIOs, and security-minded CEOs that brings together?critical news, expert insights, and product information to help leaders?make informed?business decisions. Subscribe and get plugged in to cyber. The Cyber Jack Podcast is an in-depth take on critical cyber issues, featuring top experts from around the industry. The podcast covers the latest in nation-state threats, security challenges, cyber culture, and diversity, equality and inclusion.
- 网站
-
https://www.enterprisesecuritytech.com
Enterprise Security Tech / The Cyber Jack Podcast的外部链接
- 所属行业
- 互联网出版
- 规模
- 2-10 人
- 总部
- Silicon Valley
- 类型
- 自有
- 创立
- 2020
地点
-
主要
US,Silicon Valley
Enterprise Security Tech / The Cyber Jack Podcast员工
动态
-
As Thanksgiving approaches, the attack highlights the vulnerabilities in supply chain ecosystems and the far-reaching consequences of cyberattacks targeting critical service providers. Read more insights from Trustwave, Swimlane, Semperis, AttackIQ: https://lnkd.in/gC2fyzfu
Ransomware Attack on Blue Yonder Disrupts Global Retail Operations Ahead of Holidays
enterprisesecuritytech.com
-
In 2025, the convergence of #networking and #security, alongside the growing influence of #AI, will define how businesses adapt to a more distributed and complex digital landscape. Industry experts at Aryaka, a leader in managed network and security services, share insights on how these trends will unfold and what challenges lie ahead. Read more: https://lnkd.in/g9P8rzaX
The Future of Networking and Security: How AI and Convergence Will Reshape 2025
enterprisesecuritytech.com
-
“Telecoms networks now represent a new and desirable stratum for threat actors to target for years to come,” said David Wiseman, VP of Secure Communications at BlackBerry. “The national security implications are profound. This is the third telecom provider compromised by the PLA in the last 12 months. The systematic campaign of infiltration will take months to root out," said Tom Kellermann, SVP of Cyber Strategy, Contrast Security Read more: https://lnkd.in/ggSTFqkF
China’s Cyberespionage Campaign Targets U.S. Telecoms, U.S. Warns
enterprisesecuritytech.com
-
Signal, one of the most secure messaging platforms available, has built its reputation on robust encryption and privacy protections. Yet, a recent analysis by SandboxAQ has revealed vulnerabilities in Signal Desktop’s key management system that could compromise users’ messages and identities. https://lnkd.in/gkAPhmrY
Can Signal Desktop Be Made More Secure? Researchers Explore Hardware-Based Fixes
enterprisesecuritytech.com
-
“This fraud campaign executed by #SilkSpecter is a prime example of the danger of online shopping without exercising proper awareness,” says Max Gannon, Cyber Intelligence Team Manager at COFENSE. “As the holiday season approaches, the stakes are even higher for online shoppers. Threat actors increasingly deploy tactics like the use of fake sites and brand impersonation. These tactics exploit the trust that individuals place in legitimate companies.” https://lnkd.in/gdE3meE4
Chinese Cybercrime Group "SilkSpecter" Targets Holiday Shoppers with Sophisticated Fraud Campaign
enterprisesecuritytech.com
-
Tyler Reese, CISSP, Director of Product Management at Netwrix Corporation, highlighted the broader implications of the DemandScience incident, emphasizing the importance of proactive asset management and system decommissioning. https://lnkd.in/gUXF-cKj
DemandScience Data Breach Highlights Risks of Neglected Systems in Cybersecurity
enterprisesecuritytech.com
-
“Although the breach is over a year old, its persistent aftereffects continue to underscore a critical issue for organizations today – the security risks posed by external partners.”- Nick Mistry, SVP and Chief Information Security Officer, Lineaje Inc, noted. Read more: https://lnkd.in/gxtauq-j
Amazon Data Breach Linked to Vendor Security Vulnerability in MOVEit System
enterprisesecuritytech.com
-
Patrick Harding, Chief Architect at Ping Identity: “Recent ransomware attacks affecting hundreds of thousands of individuals is a stark reminder of the increasing sophistication of threat actors as they leverage AI to scale their attacks." https://lnkd.in/gkDmEJGh
City of Columbus Ransomware Attack Exposes 500,000 Residents to Data Breach
enterprisesecuritytech.com
-
In this Q&A, JP Perez-Etchegoyen, CTO of Onapsis, addresses the primary cybersecurity challenges SAP users face, strategies for leveraging AI in defense, and best practices for managing technical debt to ensure secure, resilient ERP systems. https://lnkd.in/gpa7dEcD
Keeping Pace with SAP: Cybersecurity Challenges and AI Solutions in an Era of Rapid Transformation
enterprisesecuritytech.com