A Chinese advanced persistent threat group (APT) was able to roam the networks of an Asian telecommunications company for years without detection by using the China Chopper command shell malware, according to Sygnia. #cybersecurity #infosec
SC Media
在线音视频媒体
New York,New York 8,234 位关注者
A CyberRisk Alliance resource, SC Media is the leading and most trusted source of cybersecurity news.
关于我们
SC Media is cybersecurity. For more than 30 years, SC has shared industry expert guidance, breaking news, and independent product reviews in partnership with and for top-level information security executives and their technical teams. SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle security challenges and establish risk management and compliance strategies. Through our website, magazine, ebooks, newsletters, or regularly scheduled digital and live events – such as SC Awards and Risksec – our readers gain the relevant information needed to safeguard their organizations and contribute to their longevity and success.
- 网站
-
https://www.scmagazine.com/
SC Media的外部链接
- 所属行业
- 在线音视频媒体
- 规模
- 201-500 人
- 总部
- New York,New York
- 类型
- 私人持股
- 创立
- 1989
- 领域
- Cybersecurity、Information Security、Technology、Online Media、Security News、Information Technology、B2B Publishing和Live Events
地点
-
主要
400 Madison Ave
Suite 6C
US,New York,New York,10017
SC Media员工
-
Greg Martin
CEO and Co-Founder - Ghost Security
-
Michael Santarcangelo
Helping Leaders forge clarity, make value visible, and build confidence to do good work, deliver value faster, and communicate what counts.
-
Jane Frankland MBE ?
Jane Frankland MBE ?是领英影响力人物 Cybersecurity Influencer | Advisor | Author | Speaker | LinkedIn Top Voice | Award-Winning Security Leader | Awards Judge | UN Women UK Delegate to…
-
Tom Spring
Journalist
动态
-
Silverfort's Hed Kovetz explained in a recent podcast with Security Weekly Productions that organizations are recognizing the need for a solution that can secure all types of identities, whether they are human, machine, privileged or non-privileged. #IAM #cybersecurity
-
The Morphing Meerkat phishing-as-a-service kit expanded its library of templates to 114 brand designs that could dynamically load phishing pages based on DNS mail exchange records, according to Infoblox. #cybersecurity #infosec #ITsecurity
-
A security evasion tool from the RansomHub malware group has been used by ESET North America researchers to trace and connect attacks conducted by three other cybercrime groups. #cybersecurity #infosec #ITsecurity
-
A team of university researchers from Denmark and India claim to have developed a novel technique capable of unmasking cybercriminals hiding behind VPNs, proxy servers and Tor browsers with up to 70% reliability. #cybersecurity #infosec #ITsecurity #IAM
-
Whether it’s RSAC, Black Hat, DEF CON, or the smaller-but-mighty community events like BSides or CactusCon, in-person events allow for those conversations in a way that chat groups just can’t replicate, says Microsoft's Sherrod DeGrippo. #cybersecurity #infosec #ITsecurity
-
SC Media转发了
The challenges of managing data leaks from the inside are real, whether the leak is intentional or not. Co-Founder and CEO Eran Barak told SC Media “Sensitive data leaks like these aren’t outliers — they’re reflections of a systemic issue across practically every organization, whether within the federal government or enterprises, highly regulated or not.” SC Media provides some great insight on the risk of data leaking from third-party communications platforms and inadvertent exposures in this article…
Human error is often at center of data leaks from secured messaging platforms like the recent leak of U.S. strikes on Houthi rebels in Yemen. “Leaked intel isn’t just a government risk — it’s an enterprise reality, whether inadvertent or with malicious intent," said Eran Barak, chief executive officer of security provider MIND. #cybersecurity #infosec #ITsecurity
-
SC Media转发了
Multifactor authentication (MFA) is supposed to keep us safe, right? But here’s the thing—most companies only scratch the surface when it comes to security! ??? What’s the coverage rate? Is it modern MFA? The ONE question no one’s asking could be putting us all at risk. Watch to uncover the truth about your online security. #Cybersecurity #MFA #OnlineSafety #TechTalk #Shorts Ben Carr Matt Alderman Jason Albuquerque CyberRisk Alliance CyberRisk Collaborative SC Media
-
Zero Trust in Action: Redefining Security for a Borderless World (Traditional security perimeters? Obsolete.) Zero Trust is no longer optional—it’s the framework for securing modern organizations. Instead of assuming trust, it verifies everything—users, devices, and applications—across hybrid, multi-cloud, and remote environments. This Hot Topics webcast brings together industry leaders to break down real-world Zero Trust strategies you can implement today. What You'll Learn: ?? Practical Steps to Zero Trust – How to design & implement a framework tailored to your infrastructure. ?? Security vs. Usability – Lock down access without killing productivity or agility. ?? AI & Automation in Zero Trust – How real-time monitoring enhances enforcement & threat detection. Zero Trust isn’t just a concept—it’s the new security standard. April 9th, join Dustin Sachs and Adrian Sanabria for actionable insights on building a Zero Trust architecture that works. ?? Register now: https://bit.ly/3RlV8W2 Know someone who needs to hear this? Tag them below! ??
-
"Multi-factor authentication is a great idea and an effective control, but realistically, it's nearly impossible for organizations to implement everywhere consistently," said Silverfort's Hed Kovetz. #cybersecurity #IAM #infosec #ITsecurity