Ilaiyaraaja And The Art Of Infosec - A Talk By Shashidhar CN At The 25th Annual Conference Of ISACA Bangalore Chapter
The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI) released a Cybersecurity Advisory (CSA) today, “People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices.”
MS OFFICE ZERO DAY EXPLOIT OUT Malicious Code Execution Traced to Weaponized Office Documents Dating From April
UNEXPECTED SECURITY FLAW FOUND IN ACTIVE DIRECTORY. Follow these steps after running the November and May Microsoft updates to fully address Active Directory vulnerabilities.
THE DARKER SIDE OF 5G MOBILE NETWORKS AND WHY ORGANISATIONS NEED TO UP THEIR MOBILE SECURITY. Greater speed, greater capacity, reduced latency and lower battery consumption are among the many benefits that 5G has to offer. But as the ultra-fast mobile network technology is rolled out, with the promise of 20-gigabit speeds, there’s a darker side to 5G that businesses should be aware of. It turns out that 5G networks suffer from the same security issues that have plagued 4G, making mobile one of the least secure ways of transmitting information in the modern age.
REPORTING CYBERSECURITY INCIDENTS IN 6 HOURS MANDATORY IN INDIA. The new guidelines issued by CERT-In to companies operating in India say that service providers, intermediaries, data centres, companies and government organisations must mandatorily report such incidents within six hours.
HOW LINUX BECAME THE NEW BULLSEYE FOR BAD GUYS Organizations need to secure, monitor and manage Linux just like any other endpoint in the network
Boards have a unique role in helping their organizations manage cybersecurity threats. They do not have day to day management responsibility, but they do have oversight and fiduciary responsibility. Don’t leave any questions about critical vulnerabilities for tomorrow. Asking the smart questions at your next board meeting might just prevent a breach from becoming a total disaster. In this article we offer 7 questions to ask to make sure your board understands how cybersecurity is being managed by your organization. Simply asking these questions will also raise awareness of the importance of cybersecurity, and the need to prioritize action.
THREAT ACTORS CONTINUE TO EXPLOIT LOG4J FLAWS IN THEIR ATTACKS, MICROSOFT WARNS. Microsoft is warning of continuing attempts by nation-state actors and cybercriminals to exploit recently discovered vulnerabilities in the Apache Log4j library to deploy malware on vulnerable systems.