Home RSS Feed

RSS Feed

Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!

Click here to copy Url for RSS Reader
  • Never-fail best practices when hiring a security researcher

    Micki_Boland_Cybersecurity Expert and Evangelist

    Micki Boland is a global cyber security warrior and evangelist with Check Point Technologies’ Office of the CTO. Micki has over 20 years in ICT, cyber security, emerging technology and innovation. Micki’s focus is helping customers, system integrators, and service providers reduce risk through the adoption of emerging cyber security technologies. Micki is an ISC2 […]

    Source: CyberTalk | Published: Jul 1, 2022
  • 7 security and technology white papers to read right now

    Whitepapers_Abstract Concept

    EXECUTIVE SUMMARY: Are you in charge of leading change? Drive sustainable infrastructure development at speed and scale by deploying fully-researched, future-proof policies, processes and products recommended and curated for you by a community of knowledgeable experts. CyberTalk.org’s collection of white papers provides you with out-of-the-box, in-depth risk mitigation and resilience strategies that can help you […]

    Source: CyberTalk | Published: Jul 1, 2022
  • Wide range of routers under attack by unusually sophisticated malware

    Router Malware Concept

    EXECUTIVE SUMMARY: Across North America and Europe, an advanced hacking group has dedicated nearly two years to the pursuit of infecting routers with malware. This particular type of malware can take full control over connected devices running Windows, macOS and Linux, according to security researchers. At present, as many as 80 different targets have been […]

    Source: CyberTalk | Published: Jul 1, 2022
  • The looming threat of AI-powered ransomware


    By Zac Amos, Features Editor, Rehack.com. Many people don’t think of ransomware powered by artificial intelligence as a security threat. But, it’s only a matter of time before cyber criminals worldwide figure out how to use the technology for their benefit. Here is a discussion about the looming threat presented by AI-powered ransomware and how businesses […]

    Source: CyberTalk | Published: Jun 30, 2022
  • Microsoft 365 now prevents data leaks with session timeouts

    Microsoft Office Concept

    EXECUTIVE SUMMARY: Microsoft recently announced the general availability of tenant-wide idle session timeouts for Microsoft 365 web page apps. This is intended to protect confidential information on shared or non-company devices that may unintentionally be left unattended for long stretches of time. When switched on, the session timeout capability ensures that sensitive information cannot easily […]

    Source: CyberTalk | Published: Jun 29, 2022
  • The best travel security tips from a bona-fide CISO!

    Pete Nicoletti, FIeld CISO Americas

    Pete Nicoletti, Field CISO – Americas, Check Point Software. The following 31 travel tips should make your journey safer and more productive! As a CISO who travels the world for both business and pleasure, these insights are experience-earned and I am eager to share them with you. Before Travel: 1. Research the particular travel challenges […]

    Source: CyberTalk | Published: Jun 28, 2022
  • Summer travel: 8 cyber security tips so that you can have more fun

    Planning a vacation with a map

    EXECUTIVE SUMMARY: Looking forward to celebrating the summer season with epic outdoor escapes that inspire, entertain and awe? As you daydream about natural landscapes, adrenaline-filled adventures or picturesque family picnics, hackers are dreaming about how to break into your environment. Let’s visit wild places, seek adventures and conquer cyber security – all at the same […]

    Source: CyberTalk | Published: Jun 28, 2022
  • Actionable Zero Trust info to help you actualize a better security strategy

    Mazhar Hamayun, Check Point Software

    Mazhar Hamayun is a cyber security professional with over 20 years of hands-on technology and leadership experience. At Check Point Software, Mazhar works as a cyber security engineer and in the Office of the CTO, committed to helping different organizations achieve success in both strategic and technical initiatives while contributing to Check Point’s own security […]

    Source: CyberTalk | Published: Jun 27, 2022
  • Google sends alert about “Hermit” spyware on Android and iOS devices

    Google issues an alert pertaining to spyware on phones

    EXECUTIVE SUMMARY: Google has issued an alert concerning government-grade spyware on phones. The company warns that select international governments are leveraging this technology to hack into iOS and Android phones for surveillance purposes. The spyware in question was developed by RCS Lab, a Milan-based ‘lawful intercept’ company. ‘Lawful intercept’ means that RCS Lab can only […]

    Source: CyberTalk | Published: Jun 24, 2022
  • Where does my CISO live?

    Edwin Doyle, Cyber Security Evangelist, Check Point Software

    Edwin Doyle, Global Cyber Security Evangelist, Check Point Software. Within your organization, who does the CISO report to? Research shows that the majority of organizations need to carefully assess or reassess the CISO’s reporting relationship. According to the IANS annual CISO Compensation and Budget Survey, nearly 70% of CISOs report to a technical manager. More […]

    Source: CyberTalk | Published: Jun 23, 2022
  • The overlooked keys to success within the modern CISO role

    Office concept

    EXECUTIVE SUMMARY: The cyber security landscape is fast-evolving and security represents a critical concern for companies in every industry. The threats are increasing. Businesses are facing more pressure than ever before to get data management right. But CISOs and executive teams are prone to stumbling in this one area…Here’s what every business leader needs to […]

    Source: CyberTalk | Published: Jun 23, 2022
  • Nichirin automotive group shuts down controls due to ransomware attack

    Vehicle concept

    EXECUTIVE SUMMARY: Automotive hose maker Nichirin, headquartered in Japan, reports that a US subsidiary has encountered a ransomware attack. Computerized controls were shut down as quickly as possible. The group transferred to manual production and shipping in order to continue business processes. This ransomware attack illustrates the growing importance of supply chain security across all […]

    Source: CyberTalk | Published: Jun 22, 2022