ICYMI: Cybersecurity Veteran Focuses on Advising Government, Financial Sectors Over his 23-year career in cybersecurity, Tom Kellermann has focused on policy, endpoints and even strategic investments. Now, in his new role as senior vice president of cyber strategy at Contrast Security, his mission is to protect code security – particularly in the public and financial…
Read more
ICYMI: Vulnerabilities Appear Not to Have Been Exploited in the Wild Chat app WhatsApp patched two memory-related flaw that could be exploited by an attacker as a first step to installing smartphone malware on Android or Apple devices. WhatsApp vulnerabilities can be highly valuable to malicious actors.http://dlvr.it/SZF1Lc
ShiftRight Acquisition to Simplify Management, Operations Across DLP, CASB & CNAPP Zscaler has bought out of stealth a startup established by the founders of Lacework to automate security management and dramatically reduce incident resolution time. ShiftRight will give customers real-time visibility into their security posture and help them manage an influx of risks and incidents.http://dlvr.it/SZDbZn
http://dlvr.it/SZDDdg
The latest edition of the ISMG Security Report discusses what went wrong for Optus in the wake of one of Australia’s biggest data breach incidents, the state of code security today and the growing trend of private equity firms pursuing take-private deals.http://dlvr.it/SZDBG6
Cybersecurity Veteran Focuses on Advising Government, Financial Sectors Over his 23-year career in cybersecurity, Tom Kellermann has focused on policy, endpoints and even strategic investments. Now, in his new role as senior vice president of cyber strategy at Contrast Security, his mission is to protect code security – particularly in the public and financial sectors.http://dlvr.it/SZD9Fy
Vulnerabilities Appear Not to Have Been Exploited in the Wild Chat app WhatsApp patched two memory-related flaw that could be exploited by an attacker as a first step to installing smartphone malware on Android or Apple devices. WhatsApp vulnerabilities can be highly valuable to malicious actors.http://dlvr.it/SZ9Ysw
ICYMI: A Raft of Cyber Disruptions Hit the South American Country in September A phishing email led to the spread of the Cryptolocker Trojan inside the court system of Chile, adding to a growing list of cyber disruptions affecting the South American country. Court officials stressed that the virus was contained before it could disrupt…
Read more
http://dlvr.it/SZ8p17
http://dlvr.it/SZ8fX8