XDR Needs Network Data and Here’s Why

Credit to Author: Jon Clay (Global Threat Communications)| Date: Wed, 07 Aug 2019 15:56:40 +0000

As we’ve discussed in previous blogs, XDR is a better way to detect attacks within a network since it is able to coordinate and collaborate threat intelligence and data across multiple threat vectors, including endpoint (including mobile and IIoT), server, network, messaging, web, and cloud. In this blog I want to discuss an area of…

The post XDR Needs Network Data and Here’s Why appeared first on .

Read more

Digital skimmers: What are they and how can I keep my card details safe online?

Credit to Author: Trend Micro| Date: Wed, 07 Aug 2019 14:05:18 +0000

A few weeks ago, British Airways was hit by the largest ever regulatory fine of its kind, after global customers visiting its website had their card data stolen. The $228m penalty levied by the UK’s privacy watchdog reflects the seriousness of the attack and the carrier’s failure to protect its customer’s personal and financial information….

The post Digital skimmers: What are they and how can I keep my card details safe online? appeared first on .

Read more

Slack beefs up mobile security controls for Enterprise Grid

Credit to Author: Matthew Finnegan| Date: Tue, 06 Aug 2019 08:00:00 -0700

Slack today unveiled new security capabilities for Enterprise Grid customers, including tighter controls for admins who oversee mobile device access.

Enterprise Grid was launched in 2017 for Slack’s biggest customers, with additional features to support large-scale deployments. Among the 150 organizations now using Enterprise Grid are Capital One, IBM and Target. 

Slack has continued to build out security and compliance features for the software since its introduction, including the addition of enterprise key management last September.  

To read this article in full, please click here

Read more

Train to become an ethical hacker for only $39

Credit to Author: DealPost Team| Date: Tue, 06 Aug 2019 07:05:00 -0700

There are countless hackers and threats looming on the internet, so IT departments are in high demand for cybersecurity professionals to pinpoint threats before they strike. Luckily, there’s no better way to fight fire than with fire; ethical hackers study hacking techniques so that IT infrastructures will be better prepared for attacks. If you’re interested in becoming a hacker (legally, of course), then this $39 bundle is right for you.

To read this article in full, please click here

Read more