Wednesday, August 28, 2019

Ransomware attacks target local Texas governments

 
Security Digest
Information security news and advice from TechTarget's network |August 28, 2019
TechTarget
FEATURED STORY
Carbon Black acquisition bolsters VMware's security play
by Michael Heller, Senior Reporter
VMware announced an agreement to acquire endpoint security vendor Carbon Black in an effort to boost its cloud security offerings; the all-cash deal is valued at $2.1 billion. (SearchSecurity.com)
Advertisement
NEWS
 
Texas ransomware attack hits 22 municipalities, demands $2.5M
Ransomware attacks hit 22 municipalities around Texas, most of which appear to be smaller local governments, but the details surrounding the attacks are still unclear. (SearchSecurity.com)
 
Puppet launches its first vulnerability remediation product
Puppet Remediate is a vulnerability remediation product that shares data between security and IT ops, provides risk-based prioritization and offers agentless remediation. (SearchSecurity.com)
 
Security pros reiterate warning against encryption backdoors
The majority of security professionals believe countries with government-mandated encryption backdoors are more susceptible to nation-state cyberattacks. (ComputerWeekly.com)
 
DARPA unveils first SSITH prototype to mitigate hardware flaws
DARPA is still in the early prototype stages of its SSITH program, but the aim is to develop an open source chip able to block hardware attacks and reduce the need for software patches. (SearchSecurity.com)
EXPERT ADVICE
 
Complexity requires new cloud-based patch management strategies

Patch management for cloud creates new challenges than traditional in-house programs. Expert Dave Shackleford presents patch management best practices for providers and consumers alike. (SearchCloudSecurity.com)

 
What's the best way to prevent XSS attacks?
To prevent cross-site scripting attacks, software developers must validate user input and encode output. Review characters to filter out, as well as sources and sinks to avoid. (SearchSecurity.com)
 
Defending against the most common wireless network attacks
The most common wireless network attacks change over time, but not that much. Find out which tactics still work for attackers and how to defend against them. (SearchSecurity.com)
 
The difference between zero-day vulnerability and zero-day exploit
A zero-day vulnerability isn't the same as a zero-day exploit. Learn the difference between these two zero-day terms, as well as why they should be high priority on any CISO's patching list. (SearchSecurity.com)
 
Securing IoT involves developers, manufacturers and end users alike
Who's to blame for the IoT security problem: manufacturers creating devices, end user deploying them or governments not creating legislation enforcing security measures? (SearchSecurity.com)
 
How to bolster IAM strategies using automation
IAM processes and technologies play an important role in security strategies, but organizations and IT professionals need to ensure these strategies are robust enough to deal with new threats. (ComputerWeekly.com)
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: