Wednesday, November 6, 2019

Ad network still connected to Master134 malvertising campaign, despite denials

 
Security Digest
Information security news and advice from TechTarget's network | November 6, 2019
TechTarget
FEATURED STORY
Adsterra still connected to malvertising campaign, despite denials
by Rob Wright, News Director

Despite a pledge of "zero tolerance" for malicious activity, ad network Adsterra was found to be once again connecting with the Master134 malvertising campaign.

Advertisement
NEWS
 
Splunk Mission Control launch enables a unified SOC

Mission Control is intended to unify Splunk Enterprise Security, Splunk Phantom and Splunk User Behavior Analytics into the Splunk Security Operations Suite.

 
Threat Stack Application Security Monitoring adds Python support
Now supporting both Python and Node.js, Application Security Monitoring can identify risk throughout the software development lifecycle for both third-party and native code.
 
Imperva CEO steps down following breach investigation

Chris Hylen unexpectedly stepped down as CEO of Imperva in the wake of a data breach involving cloud WAF customer data, though it's unclear if the two events are connected.

 
Ransomware authors seeking new ways to avoid being spotted
Sector analysis from Sophos has revealed some insight into how malware authors are adapting to thwart cybersecurity controls.
EXPERT ADVICE
 
AI for good or evil? AI dangers, advantages and decisions

Good guys and bad guys both use AI, but the bad guys don't need to worry about complying with rules and regulations. What can security leaders do to level the playing field?

 
A cybersecurity skills gap demands thinking outside the box

Today's security team shortages can't be filled using yesterday's thinking. Learn what other IT security leaders are doing to plug the skills gap and keep their organization safe.

 
CISOs, does your incident response plan cover all the bases?

Security incidents, let's face it, are essentially inevitable. How do you cover the key bases -- education, inventory and visibility -- in planning for incident response?

 
When cyberthreats are nebulous, how can you plan?

Security planning is tough when you're short-staffed and hackers have smart tech too. You'll need solid skills and, most of all, a willingness to use your imagination.

 
Understand CASB technology before you buy
CASB technology offers threat protection, increased visibility and policy enforcement. Explore how these tools protect access to cloud applications, and then compare some of the top products.
 
Enterprises feel the pain of cybersecurity staff shortages

It's hard enough keeping up with today's threats on a good day. But when your IT organization is spread thin, especially in terms of cybersecurity staff, the challenges mount.

 
Report shows CISOs, IT unprepared for privacy regulations

Several data management principles are common across new and developing privacy regulations, but Internet Society reports that many U.S. organizations are falling behind.

 
AI threats, understaffed defenses and other cyber nightmares

AI threats are as real as AI-empowered cyberdefense. But security pros can fight AI threats by exploring new routes to find IT security talent and defend their organizational assets.

 
Test your grasp of AI threats, privacy regulations and more

Test your grasp of current security topics like AI in cybersecurity and what privacy regulations require. Then receive CPE credit by passing this quiz.

 
Assessing the value of personal data for class action lawsuits
Determining the value of consumers' personal data exposed in a breach can be a challenge. Security and legal experts discuss what factors are involved in the equation.
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: