The AT&T breach serves as a stark reminder of the evolving threats to digital security and the importance of robust #cybersecurity measures for both organizations and individuals. Read more expert insights on the breach from: Katie Paxton-Fear, Traceable Daniel Schiappa, Arctic Wolf Jim Routh, Saviynt Kern Smith, Zimperium Javvad Malik, KnowBe4 Sean Deuby, Semperis Jason Soroko, Sectigo Darren Guccione, Keeper Security, Inc. Nicholas Tausek, Swimlane https://lnkd.in/gwutEnW4
Enterprise Security Tech / The Cyber Jack Podcast
Internet Publishing
Enterprise Security Tech is a cybersecurity blog for CISOs, CIOs, security-minded CEOs, and IT security pros.
About us
Enterprise Security Tech is a cybersecurity blog for CISOs, CIOs, and security-minded CEOs that brings together critical news, expert insights, and product information to help leaders make informed business decisions. Subscribe and get plugged in to cyber. The Cyber Jack Podcast is an in-depth take on critical cyber issues, featuring top experts from around the industry. The podcast covers the latest in nation-state threats, security challenges, cyber culture, and diversity, equality and inclusion.
- Website
-
http://www.enterprisesecuritytech.com
External link for Enterprise Security Tech / The Cyber Jack Podcast
- Industry
- Internet Publishing
- Company size
- 2-10 employees
- Headquarters
- Silicon Valley
- Type
- Self-Owned
- Founded
- 2020
Locations
-
Primary
Silicon Valley, US
Updates
-
SentinelOne, a leading AI-powered security firm, and Aon, a top global professional services company, have announced a strategic collaboration designed to bolster cyber risk profiling and mitigation for their clients. This partnership will leverage SentinelOne’s Singularity Platform and Aon’s expertise to provide a comprehensive approach to cyber risk management. https://lnkd.in/gapCnS-n
SentinelOne and Aon Announce Strategic Collaboration to Enhance Cyber Risk Management
enterprisesecuritytech.com
-
Chad McDonald, CISO and COO of Radiant Logic, emphasized the risks posed by insider threats. “Insider threats can quickly take hold of organizations if identity data and access rights are not properly managed and monitored. As seen with the Nuance breach, all it took was two days of an ex-employee’s access rights not being changed for the company and individual consumers to face extreme consequences. By utilizing modern day solutions to automate user access reviews and management, organizations can handle these situations urgently and with the precision needed to avoid dire situations," McDonald said. https://lnkd.in/gJ9kt4tp
Geisinger Faces Class Action Lawsuit Following Major Data Breach
enterprisesecuritytech.com
-
Curating threat exposure detection across the clear and dark web can seem daunting. But companies of any size can take some basic steps towards effective management. Read more in this guest post from Mark MacDonald, Flare: https://lnkd.in/gB6aaw-J
Practical Advice for Effective Threat Exposure Detection Across the Clear and Dark Web
enterprisesecuritytech.com
-
We spoke with Nathaniel Jones, Director of Strategic Threat and Engagement, Darktrace, to delve deeper into the recent high-profile #cryptojacking incident involving the Ethereum #blockchain flaw and its implications for the future of cryptocurrency #security. https://lnkd.in/gAKd68MC
Unpacking the Ethereum Blockchain Flaw: Insights from a High-Profile Cryptojacking Incident
enterprisesecuritytech.com
-
Rogier Fischer, CEO and Co-Founder of Hadrian Security: "Automated breach testing and #compliance reporting could have identified #vulnerabilities, ensured policy enforcement, and facilitated quicker responses to risks, thereby preventing the #breach. These systems could have also flagged the need for improved employee training to mitigate #socialengineering risks." #infosec #cybersecurity #databreach https://lnkd.in/g42_6jqx
Prudential Financial Data Breach Exposes Information of Over 2.5 Million Individuals
enterprisesecuritytech.com
-
Sygnia’s Director of Incident Response, Amnon Kushnir, emphasized the sophistication of Velvet Ant: “We discovered this vulnerability during a larger forensic investigation into China’s Velvet Ant cyberespionage group. The threat actors gathered administrator-level credentials to gain access to Cisco Nexus switches and deploy a previously unknown custom malware that allowed them to remotely connect to compromised devices, upload additional files, and execute malicious code." Read more: https://lnkd.in/gQ5-hk8a
China-Linked Velvet Ant Exploits Zero-Day Flaw in Cisco NX-OS Software
enterprisesecuritytech.com
-
The Arctic Wolf Platform is now the first native cybersecurity platform to integrate with the iManage Knowledge Work Platform. This partnership aims to enhance the security capabilities of organizations using iManage by providing comprehensive monitoring, detection, and response to advanced cyber threats targeting their environments. https://lnkd.in/gtBhcm4Y
Arctic Wolf Integrates with iManage to Enhance Cybersecurity for Sensitive Data
enterprisesecuritytech.com
-
The announcement has sparked various reactions from industry experts, highlighting the importance of maintaining high standards in certificate management and the need for proactive measures. Read more from: Tim Callan, Chief Experience Officer at Sectigo Muralidharan Palanisamy, Chief Solutions Officer at AppViewX Tomas Gustavsson, Chief PKI Officer at Keyfactor https://lnkd.in/gVu6hkVB
Experts Weigh-In: Google Chrome to Block Entrust Certificates Starting November 2024
enterprisesecuritytech.com
-
Clyde Williamson, Product Manager at Protegrity, encapsulated the gravity of the situation: "Months after the initial breach, UnitedHealth is still dealing with the long-term impacts of BlackCat's infiltration into their networks. We're now learning that personally identifiable information (PII, personal health information (PHI), and billing information were all part of this incident." https://lnkd.in/gWycpyQB
The UnitedHealth Data Breach – A Stark Reminder of Healthcare's Vulnerabilities
enterprisesecuritytech.com