Wednesday, December 4, 2019

Misconfigured Firebase databases absent from Google's scrubbed search results

 
Security Digest
Information security news and advice from TechTarget's network |December 04, 2019
TechTarget
FEATURED STORY
Exposed Firebase databases hidden by Google search

by Rob Wright, News Director

A security researcher found Google's search engine hides results for misconfigured Firebase databases that are publicly accessible on the internet.

Advertisement
NEWS
 
Ransomware attacks shaking up threat landscape -- again

Threat actors have employed new techniques and built more sophisticated business models for their ransomware campaigns, which has had devastating consequences.

 
The Security Interviews: Do cyber weapons need a Geneva convention?

F-Secure's Mikko Hypponen discusses cyber weapons and nation-state threats. Learn how arms limitations treaties might one day expand to include malware and other threats.

EXPERT ADVICE
 
The top 3 use cases for AI endpoint security tools

Endpoint attack surfaces are growing, and cybersecurity pros struggle to keep up. Consider the following use cases for AI endpoint security techniques in the enterprise.

 
Key features in building a security operations center

Building a security operations center means understanding the key features you need to ensure your network remains protected against threats.

 
What are the top network security techniques for modern companies?

Protecting the enterprise network remains integral to overall IT security. Here are the top network security techniques enterprises are using to protect data.

 
The network security tools to combat modern threats

Incorporating new network security tools and methods into your enterprise's infosec program may mean the difference between staying safe or falling victim to an attack.

 
What is the role of CISO in network security?
The role of CISO in network security goes beyond risk management. It also requires understanding compliance regulations and business needs, as well as the ability to communicate security policies to nontechnical employees.
 
How to evaluate CASB tools for multi-cloud deployments

When it comes to evaluating CASB tools, it's essential to be an informed customer. Identify your organization's usage and security goals to get the context you need before you buy.

 
Do you have the right set of penetration tester skills?
Pen testing is more than just the fun of breaking into systems. Learn about the critical penetration tester skills potential candidates must master to become proficient in their career path.
 
As cybersecurity insurance coverage becomes common, buyer beware

Cybersecurity insurance coverage can certainly have its benefits after a breach, but companies must consider a variety of unique business factors before choosing a policy.

 
Role of AI in cybersecurity and 6 possible product options

Cyberthreats loom large in this modern IT environment. Explore the six most common roles of AI in cybersecurity and the products synthesizing them.

 
Privacy compliance rules shaping future IT security processes
As companies scramble to comply with consumer data privacy compliance mandates like GDPR, CCPA and others on the horizon, IT security will shoulder much of the process burden.
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: