If You’re Long #Cybersecurity Stocks, These 3 Are Closing In On Buy Points

The software sector is continuing to produce market leaders, and top cybersecurity software stocks Proofpoint (PFPT), Okta (OKTA) and FireEye (FEYE) are each closing in on new buy points. Meanwhile, Palo Alto Networks (PANW), CyberArk Software (CYBR), Qualys (QLYS) and Zscaler (ZS) are all moving higher, but their consolidations are too short to be considered bases. Top Cybersecurity Stocks Proofpoint, Okta, FireEye, Palo Alto,…


read more

Mimecast acquires Ataata to improve #cyber #security #training

Mimecast Limited today announced it has acquired cyber security training and awareness platform Ataata The acquisition aims to allow customers to measure cyber risk training effectiveness by converting behavior observations into actionable risk metrics for security professionals. According to research Mimecast conducted with Vanson Bourne, 90 percent of organizations have seen phishing…


read more

#Chinese Police Arrest #Malware Developers Who #Hacked $2 Million in #Crypto

The developers are responsible for hacking millions of computers to hack a total of $2 million in cryptocurrencies. Computers were initially infected with a mining program and a mining monitoring software — whenever the latter detected CPU utilization below 50%, the former would silently start mining in the background. The…


read more

Cybersecurity #experts #agree — expect more #ransomware this #year

Ransomware is one of the easiest cyberattacks to detect because it comes with an actual ransom note. However, 2017 gave way to new propagation mechanisms, which automated worming and increased infection rates. Employee-facing services and technologies are a top concern to cybersecurity professionals. About 40% of employees use personal devices…


read more

Four #cybersecurity #tips for #travelers

Do you sacrifice convenience for security when you’re traveling on vacation or on business? A University of Phoenix survey says very few people take precautions to safeguard their data while traveling. “You need to practice the same cybersecurity precautions that you take at home or at work when you are…


read more

Why #trust is the #essential #currency of #cybersecurity

Cisco trust strategy officer Anthony Grieco spoke with TechRepublic’s Dan Patterson about how organizations can improve security by building trust. Watch the video or read their conversation: Patterson: Humans remain the intractable cybersecurity problem. They also represent a cybersecurity potential solution … I wonder if we could start with that…


read more

Applying the #Hacker #Mindset to #Cybersecurity #Strategy

The majority of hackers surveyed in the 2018 “Black Report”claimed they could breach a perimeter and exfiltrate data in less than a day. The results were similar across industries, from telecommunications companies to law firms, federal government, critical infrastructure, and aviation. Cyber defense can seem like a constant game of…


read more

We’re all a #bit of #Trump when it #comes to #cybersecurity

President Trump reportedly sees security procedures as too inconvenient. Unfortunately, he’s not alone. Let’s face it folks: Security can be “too inconvenient” and when your boss doesn’t want to adhere to your security policy it’s going to be difficult to enforce. Just ask President Trump. Politico reported that Trump could…


read more

Cybersecurity 101: Your #End-Users are the #First #Line of #Defense

Phishing is one of the main cybersecurity risks that organizations of any size face, and it’s a major way in which an organization can become compromised. However, many organizations still don’t have a cybersecurity plan despite the growing threats that they are facing every day. Many organizations’ corporate cultures truly…


read more

Cyber security #attack #experts issue #warning over #malware #targeting #credit #cards

CYBER SECURITY experts have issued a warning to online shoppers about a sophisticated new type of malware targeting credit and bank card details. Anyone storing credit card details on either a Google Chrome or Firefox browsers could be in danger of giving hackers access to sensitive personal financial information. That’s…


read more

5 #ways the #utility #industry can #mitigate #cyber #incidents

Drive up to an industrial work site, or walk across a factory floor, and you’re likely to see a familiar sign: “X days without a safety incident.” Soon, corporate offices may sport a similar, cybersecurity-focused sign. With the rising urgency of threats to the power grid, cybersecurity is becoming prioritized…


read more

Why #Establishing #Cybersecurity #Benchmarks is a Must for #Organizations

Effective cybersecurity involves regularly assessing the effectiveness of your organization’s policies, tools, and processes to ensure you’re staying ahead of the curve. In order to gain insight into your cybersecurity performance, you need clear, continuous, actionable metrics that you can track over time and compare to peers, competitors, and across…


read more

For #Cyber #Insurance #Companies, #Attacks Can Be #Riskier Than A #Hurricane

When PricewaterhouseCoopers released a report in 2015 that predicted the cyber insurance industry would see premiums triple in five years and reach at least $7.5 billion by 2020, the rising threat of cyberattacks meant they would likely become more extreme. The White House Council of Economic Advisers calculated earlier this…


read more

Pen #testers find #weaknesses in #banks’ #cyber #security

Humans are the biggest weakness in banks’ cyber defences, but there are several others that also need attention, penetration testers have revealed Banks have formidable barriers to external cyber attacks, but some are still vulnerable to internal attacks using social engineering, vulnerabilities in web applications and the help of insiders,…


read more