Saturday, December 16, 2017

Microsoft Azure AD Connect Flaw Elevates Employee Privilege

An improper default configuration gives employees unnecessary administrative privilege without their knowledge, making them ideal targets for hackers.

8 Out of 10 Employees Use Unencrypted USB Devices

Security policies for USB drivers are severely outdated or inadequate, a report finds.

Only 5% of Business Leaders Rethought Security After Equifax

Corporate leaders know little about common security threats like ransomware and phishing, driving their risk for attack.

How Good Privacy Practices Help Protect Your Company Brand

Follow these five guidelines to keep your organization's data protected.

Employees on Public WiFi Rarely Face Man-in-the-Middle Attacks

Employees' corporate mobile devices are connected to WiFi networks on average 74% of the time.

Russian-Speaking ‘MoneyTaker’ Group Helps Itself to Millions from US Banks

Banks in Latin America appear to be next big target, Group-IB says.

Romanian Nationals Admit to Racketeering Conspiracy, ATM Skimming

Seven Romanian nationals pleaded guilty in connection with an ATM skimming scheme and RICO conspiracy, in addition to other crimes.

5 Reasons the Cybersecurity Labor Shortfall Won’t End Soon

The number of unfilled jobs in our industry continues to grow. Here's why.

Oracle Product Rollout Underscores Need for Trust in the Cloud

Oracle updates its Identity SOC and management cloud with security tools to verify and manage users trusted with access to cloud-based data and applications.

Post-Breach Carnage: Worst Ways The Axe Fell in 2017

Executive firings, stock drops, and class action settlements galore, this year was a study in real-world repercussions for cybersecurity lapses.

Gartner: IT Security Spending to Reach $96 Billion in 2018

Identity access management and security services to drive worldwide spending growth.

What Slugs in a Garden Can Teach Us About Security

Design principles observed in nature serve as a valuable model to improve organizations' security approaches.