Wednesday, April 8, 2020

Zoom tackles Zoombombing; Hospitals issued ransomware warning

 
Security Digest
Information security news and advice from TechTarget's network |April 08, 2020
TechTarget
FEATURED STORY
Microsoft warns hospitals of impending ransomware attacks

by Arielle Waldman, News Writer

Microsoft warned 'dozens' of hospitals with vulnerable gateway and VPN software that the infamous ransomware group REvil is scanning the internet for such flaws.

Advertisement
NEWS
 
Zoom takes new security measures to counter 'Zoombombing'

Zoom has implemented two key security and privacy measures in order to counter 'Zoombombing.' One enables passwords in meetings by default, while the second creates waiting rooms.

 
Risk & Repeat: Zoom security comes under fire
This episode of the Risk & Repeat podcast discusses several Zoom security issues that came to light over the last week, including transmission of user data to Facebook.
 
Beazley: Ransomware attacks on clients 'skyrocketed' in 2019

The 2020 Beazley Breach Briefing reported a 131% increase in reported attacks against clients last year, and the insurance giant isn't expecting the trend to slow down.

 
Zoom zero-day vulnerabilities patched a day after disclosure
An ex-NSA hacker reported two zero-day vulnerabilities on his blog Wednesday. One of them can give an attacker control of a user's webcam and microphone. Zoom fixed both flaws quickly.
EXPERT ADVICE
 
Shifting security left: How to pivot from DevOps to DevSecOps

A successful DevSecOps rollout requires software developers to be equipped with the proper security skills and tools. Learn how to transition smoothly from DevOps to DevSecOps.

 
AI Security Alliance urges clarity for buying AI security tools
Vendors and customers must be aware of potential gaps between expectations and reality in the sale or purchase of AI cybersecurity products, an AI security expert advises.
 
4 essential AI-enabled security concerns for buyers and vendors
Experts offer four concerns for enterprises and vendors to discuss in order to deploy and run AI-based cybersecurity tools.
 
Considering the differences in LAN vs. WAN security

Given the differences in the security of LAN and WAN, enterprises need to guard against insider threats, secure against unauthorized access and potentially secure the edge, too.

 
Comparing SASE vs. traditional network security architectures
Today's dispersed environments need stronger networking and security architectures. Enter cloud-based Secure Access Service Edge -- a new model for secure network access.
 
SASE identity policies enhance security and access control
Will the Secure Access Service Edge model be the next big thing in network security? Learn how SASE's expanded definition of identity is fundamental to this emerging access model.
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: