SBN News
Malicious extensions: Avast detects new threats on the Chrome Web Store
In the ever-evolving cybersecurity landscape, new threats emerge every day. Our team at Avast recently discovered a series of malicious browser extensions on the Chrome Web Store that are spreading adware and ...
The rise and fall of ransomware: Insights from Avast’s Q1/2023 Threat Report
What’s on your computer right now? Let’s make a list. Start with every work-related document you’ve used or created in the last six months. After that, perhaps your monthly budgets, pictures from ...
RSAC Fireside Chat: Reinforcing ‘Identity and Access Management’ to expose ‘shadow access’
The world of Identity and Access Management (IAM) is rapidly evolving. Related: Stopping IAM threats IAM began 25 years ago as a method to systematically grant human users access to company IT ...
Ekran System to Participate in Inaugural National Channel & MSSP Cyber Summit
Ekran System Inc. will join the inaugural National Channel & MSSP Cyber Summit in Chicago, Illinois. The event will take place at the Marriott Marquis Chicago in the Grand Horizon Ballroom on ...
Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration
Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004. Related: What China’s spy balloons portend A stark reminder of this relentless malaise: ...
Meta’s $1.3 Billion Fine, AI Hoax Hysteria, Montana’s TikTok Ban
In this episode, we discuss Meta’s record-breaking $1.3 billion fine by the EU for unlawfully transferring user data, shedding light on the increasing risks faced by tech companies in violating privacy rules ...
Revolutionizing DMARC Solutions: Permission Management
EasyDMARC’s cloud-native platform has been evolving since we ... The post Revolutionizing DMARC Solutions: Permission Management appeared first on EasyDMARC ...
RSAC Fireside Chat: Uptycs emulates Google, Akamai to protect cloud-native apps and endpoints
The inadequacy of siloed security solutions is well-documented. Related: Taking a security-first path The good news is that next-gen security platforms designed to unify on-prem and cloud threat detection and remediation are, ...
The Legacy of The Hacker Manifesto
I was 11 years young when The Hacker Manifesto was originally published in 1986 (yes, I’m that old). I had no idea about the manifesto at that age but several years later ...
GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms
Zero trust networking architecture (ZTNA) is a way of solving security challenges in a cloud-first world. Related: The CMMC sea change NIST SP 800-207A (SP 207A), the next installment of Zero Trust ...