Wednesday, May 13, 2020

Cyber Threat Coalition responds to COVID-19 threats; plus GitHub's new 'secret' scanning tool

 
Security Digest
Information security news and advice from TechTarget's network |May 13, 2020
TechTarget
FEATURED STORY
Volunteers join forces to tackle COVID-19 security threats

by Arielle Waldman, News Writer

The COVID-19 Cyber Threat Coalition has amassed approximately 4,000 volunteers from the infosec community to monitor, analyze and block pandemic-themed threats across the globe.

Advertisement
NEWS
 
Healthcare organizations sitting on 'unexploded' ransomware

Threat reports show ransomware attacks against healthcare organizations are down. But experts say that threat actors may be lurking in networks and waiting to strike at a later date.

 
Advanced Computer Software leak exposes nearly 200 law firms
Researchers at cybersecurity vendor TurgenSec discovered an exposed database owned by Advanced Computer Software that contained legal documents with data from 190 law firms.
 
GitHub security features tackle data exposures, vulnerabilities

In an effort to curb accidental data exposures in repositories, GitHub unveiled a new 'secret' scanning tool that examines public and private code repositories for sensitive data.

 
Research finds ransomware payments, demands increasing
Research from incident response vendor Coveware and national law firm BakerHostetler shows massive increases in both ransomware demands and payments from victims.
EXPERT ADVICE
 
The what, why and how of the Spring Security architecture

Like any framework, Spring Security requires writing less code to implement the desired functionality. Learn how to implement the Spring Security architecture in this book excerpt.

 
How can security benefit from cyberthreat intelligence?
Cyberthreat intelligence is essential to understand common external-facing risks. Learn how to find the right threat intelligence feed and how the data can benefit cybersecurity.
 
Plan now for the future of network security
How to battle well-funded, technologically sophisticated threats and ensure high-quality network performance? CISOs need a plan to meet network challenges now and in the future.
 
Identifying common Microsoft 365 security misconfigurations

Microsoft 365 security problems can double the time it takes to contain a breach, according to a new survey. Check out best practices and operational strategies to fix them.

 
Why developers need to know the Spring Security framework
The Spring Security framework is a reliable way for Java developers to secure applications. However, proper implementation is critical to prevent the most common vulnerabilities.
 
The state of cybersecurity risk: Detection and mitigation
Hackers will always try to creep in, and many will succeed. That's why effective detection and mitigation are essential. How are enterprises faring?
About This E-Newsletter
The Security Digest is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: