Wednesday, May 20, 2020

Verizon: Data breaches doubled in 2019; Plus, infosec conferences go virtual

 
Security Digest
Information security news and advice from TechTarget's network |May 20, 2020
TechTarget
FEATURED STORY
Verizon DBIR: Breaches doubled, but plenty of silver linings

by Arielle Waldman, News Writer

The 2020 Verizon Data Breach Investigations Report showed the number of confirmed breaches last year nearly doubled, but it also highlighted some positive trends.

Advertisement
NEWS
 
CISA identifies malware from North Korean hacking group

The Cybersecurity and Infrastructure Security Agency, in conjunction with the FBI and DoD, has identified three variants of malware used by the North Korean government.

 
Q1 data breaches down, but exposed records reach new high
Threat intelligence firm Risk Based Security released its 2020 Q1 Report, which shows a 273% increase in exposed records and 42% decrease in publicly reported breaches.
 
Advent calls off Forescout acquisition
On what was scheduled to be the closing day, Forescout Technologies instead announced Advent International will not proceed with the $1.9 billion acquisition as planned.
 
Experts say mobile voting tech isn't the answer to COVID-19

Despite the mounting need for an alternative to in-person voting amid the COVID-19 pandemic, experts say mobile and online voting is not ready for the general public.

 
Risk & Repeat: Black Hat, DEF CON canceled
This week's Risk & Repeat podcast looks at the recent cancellations of Black Hat USA 2020 and DEF CON 28 and what their virtual replacements will try to accomplish.
 
Texas struck by two ransomware attacks in one week
The Texas Department of Transportation was hit with a ransomware attack last Thursday, marking the second ransomware incident on a state agency in less than one week.
EXPERT ADVICE
 
Advance your security operations center with AI

Powering a security operations center with AI systems not only automates tasks, but also complements admins' efforts to more effectively combat threats and transform processes.

 
8 leading identity and access management products for 2020
IAM tools keep enterprises safe by ensuring only authorized users can access sensitive data and applications. Read this in-depth product overview of top tools on the market.
 
Comparing single cloud vs. multi-cloud security challenges

A multi-cloud environment is not inherently more secure than a single cloud. Learn how to choose between single cloud vs. multi-cloud for your organization from a security perspective.

 
Balancing work-from-home cybersecurity with on-site protection
Post-pandemic, organizations must strike the right balance between on-site and work-from-home cybersecurity. Here's how to make sure your cybersecurity program is prepared.
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: