Skip to content

Looking for a New Security Technology? Choose a Partner, not a Vendor “How to Make the Most of Your Time: Tips for Productivity” “Maximizing Your Time for Greater Productivity: Tips and Strategies”

As the security landscape continues to evolve and categories like EDR, XDR, and TDIR blend together, it can be difficult to make an informed decision on the best security solution for your team. To make an informed decision, it is important to evaluate the vendor’s effectiveness when it comes to customer success. Here are some… 

Critical Vulnerability in Hikvision Storage Solutions Exposes Video Security Data “5 Ways to Create a Successful Online Business” “Five Strategies for Building a Profitable Online Venture”

Video surveillance giant Hikvision this week informed customers that it has patched a critical vulnerability affecting its Hybrid SAN and cluster storage products. The vulnerability, tracked as CVE-2023-28808, has been described by the vendor as an access control issue that can be exploited to obtain administrator permissions by sending specially crafted messages to the targeted… 

CISA Publishes New Guidance for Achieving Zero Trust Maturity “5 Ways to Improve Your Sleep Quality” “5 Strategies to Enhance Your Sleep Quality”

This week, the US Cybersecurity and Infrastructure Security Agency (CISA) published an updated version of its guidance on how to achieve zero trust maturity. Zero trust is an approach to security that assumes that a breach has already occurred and is based on the idea that no user or asset should be trusted. The goal… 

Windows Zero-Day Exploited in Nokoyawa Ransomware Attacks “New Strategies for Improving Digital Security” “Strategies for Enhancing Digital Protection”

Kaspersky reported that Microsoft’s April 2023 Patch Tuesday updates successfully addressed a Windows zero-day vulnerability that was previously being exploited by cybercriminals in ransomware attacks. The vulnerability, identified as CVE-2023-28252, is a privilege escalation flaw affecting the Windows Common Log File System (CLFS) driver. Microsoft warned that the flaw has been exploited in the wild,… 

Virtual Event Today: Zero Trust Strategies Summit “5 Tips for Managing Stress” “5 Strategies for Dealing with Stress”

Join us today for SecurityWeek’s 2023 Zero Trust Strategies Summit as we dive into the complexities of zero trust and explore ways to secure organizations by eliminating implicit trust and verifying every stage of digital interaction. Zero Trust is more than just a phrase; it is an important part of a comprehensive approach to cyber… 

Virtual Event Tomorrow: Zero Trust Strategies Summit “How to Create an Effective Study Plan” Creating an Effective Study Plan: A Guide

Unable to complete the task due to encountered complications. At the Zero Trust Security Summit, we will be exploring the concept of ZTNA (Zero Trust Network Access) and sharing war stories on how to best secure an organization. Featured sessions and topics include: Identity Powered Zero Trust How to Create a Multi-Layered Approach to Cybersecurity… 

Australian Finance Company Refuses Hackers’ Ransom Demand “Finding Ways to Reduce Stress” “Exploring Strategies to Manage Stress”

Australian firm Latitude Financial has refused to pay a ransom to the hackers who stole millions of records in one of the country’s biggest data heists. Last month, it was revealed that the hackers had stolen the personal records of around 14 million Australian and New Zealand customers. The stolen data includes 7.9 million driving…