Search This Blog

Thursday, 20 May 2021

Tech News Flash for vasy

Cybersecurity Execs Dissect the Colonial Pipeline Incident
IT experts at the hacked Colonial Pipeline did a good job in mitigating the May 7 cyberattack and successfully stopped it when discovered by shutting down the network. But the attack was mostly invisible in the weeks-long initial stages, according to a briefing NTT Security executives conducted Tuesday.
Research Exposes 10 Common Threats Vexing Cloud Customers
New research by threat detection and response firm Vectra AI shows that the most common threats to corporate networks remain consistent throughout all companies -- regardless of their size. Researchers calculated the relative frequency of threat detections that were triggered during a three-month span.
Mobile Devices Under Siege by Cyberattackers
Cybercriminals are deliberately targeting phones, tablets, and Chromebooks to increase their odds of finding a vulnerable entry point. The Financial Services Threat Report from Lookout disclosed that 20 percent of mobile banking customers had a trojanized app on their devices when trying to sign into their personal mobile banking account. 
Apple Needs This New Hire to Be Heroic
For anyone that still believes that Apple can be more than an incredibly profitable company; but one you can also be proud of for how it treats its people and customers, incoming VP of worldwide communications Stella Low could be the critical remedy for what ails the firm. Let's talk about Apple this week. Then we'll close with the product of the week: the HP Elite Folio Notebook.
Two-Thirds of CISOs Admit They're Not Ready to Face a Cyberattack
The 2021 edition of Proofpoint's Voice of the CISO report -- based on a survey of more than 1,400 CISOs in 14 countries -- found 66 percent of the executives acknowledged their organizations were unprepared to handle a targeted cyberattack this year. In addition, more than half the CISOs admitted they are more concerned about the repercussions from a cyberattack this year than they were in 2020.
TRENDING ON TECHNEWSWORLD
Alliances Formed to Plug Security Holes in the IoT

Advancements in 5G connectivity and accelerated digital transformation of business operations creates heightened risk and expanded attack surfaces for security teams to harden and protect. Now, efforts by several internet industry groups are...

Read more
www.technewsworld.com
Allow App to Track? Most iOS 14.5 Users Tap Fuggedaboutit!

More than 90 percent of U.S. users of the latest version of Apple's mobile operating system iOS 14.5 are taking advantage of a new feature to block an application's ability to track their activity on their phones. Worldwide, 88 percent of users...

Read more
www.technewsworld.com
FEATURED RESOURCES
Scholarship Opportunity | MS in Cyber Security | USD

University of San Diego is proud to announce the availability of limited scholarship funds for new students admitted to the M.S. in Cyber Security Operations and Leadership (CSOL) program for the Fall 2021 term.

Read more
onlinedegrees.sandiego.edu
Contact Center AI Explained by Pop Culture | eBook

What if learning Contact Center AI were as engaging as “Blade Runner”? If understanding how it works could be less painless than how it's portrayed in “2001: A Space Odyssey”?

Read more
get.niceincontact.com
READER SERVICES
News Alerts
Get the day's top e-business and technology news from ECT News Network delivered to your inbox as stories break. Sign up today.
Feedback
We welcome your feedback. To share your thoughts or ideas, please use our online form.
Manage Subscriptions
This newsletter was sent in response to your request on an ECT News Network website. To update your settings, or to receive other newsletters from ECT News Network: Manage My Subscriptions.
BUSINESS SERVICES
How to Advertise
To advertise in this newsletter or elsewhere on ECT News Network, please call our sales department (818) 461-9700 or follow these links:

No comments:

Post a Comment