Home RSS Feed

RSS Feed

Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!

Click here to copy Url for RSS Reader
  • Global phishing attacks deliver never-before-seen malware

    Malware families

    EXECUTIVE SUMMARY: A well-resourced and sophisticated threat actor has launched an advanced global phishing campaign, featuring three never-before-seen malware families. The attack is believed to have affected more than 50 firms worldwide, which range in geography and industry type. While the US appears as the main target, EMEA, Asia and Australia have also experienced compromise […]

    Source: CyberTalk | Published: May 5, 2021
  • How might EU data security policies affect your enterprise?

    How are EU data security policies affecting your enterprise?

    EXECUTIVE SUMMARY: In Europe, privacy regulators and courts are examining the transfer of personal information to the United States. Certain types of data flows have been suspended due to data privacy and security concerns. Could the EU’s data security policy changes affect your organization? Data protection Last week, after determining that a contract with a […]

    Source: CyberTalk | Published: May 4, 2021
  • Cyber Talk’s phrase of the day: “Ransomware Insurance”

    Ransomware insurance

    EXECUTIVE SUMMARY: In the US, the Department of Homeland Security, the FBI, CISA and other federal groups are working to swiftly enact legislation and enforcement around cyber extortion. They aim to protect organizations and to enforce sanctions against criminal groups. Last year, ransom demands jumped by 47% between Q1 and Q2, for one group of organizations. As […]

    Source: CyberTalk | Published: May 3, 2021
  • Cyber threat detection: How organizations can get more with less…

    Cyber Threat Detection Concept

    EXECUTIVE SUMMARY: How can organizations obtain more expertise with little to no investment? In Washington state, a non-profit believes that it can assist. A new program enables small public-sector organizations to obtain network monitoring services and threat detection capabilities. The program is known as The Public Infrastructure Security Cyber Education System, or Pisces. Pisces works […]

    Source: CyberTalk | Published: Apr 30, 2021
  • US national security, about to make a ransomware recovery

    USA Ransomware recovery concept

    EXECUTIVE SUMMARY: Cyber security experts and federal authorities perceive ransomware as a deeply concerning national security threat. Should federal police pursue ransomware gangs with the same fervor and pace as they do with other criminal syndicates? In 2020, research showed a 7-fold increase in ransomware attacks, as compared to 2019.  Initially, ransomware began as a “low-level” cyber nuisance. Nowadays, […]

    Source: CyberTalk | Published: Apr 30, 2021
  • Can executive-level leaders achieve work-life balance?

    Work life balance concept, businessperson at desk

    EXECUTIVE SUMMARY: Is leadership culture shifting? Previous generations of executives devoted 14 hour days to their jobs, year-after-year. A belief in an unspoken “contract” between employers and executives ran rampant. Rewards would allegedly correlate with the number of hours clocked on the job. But as everyone raced for the gold professionally, personal lives disintegrated. Fractured […]

    Source: CyberTalk | Published: Apr 29, 2021
  • Global supply chain attacks and how to protect finance

    Graphs and world map concept

    EXECUTIVE SUMMARY: Could the next financial crisis occur as a result of a cyber attack? The New York State Department of Financial Services (DFS) says it’s possible. In a recent report, the DFS outlined its investigative findings surrounding the SolarWinds attack. The document provides a high-level overview of the attack, the response from companies that […]

    Source: CyberTalk | Published: Apr 28, 2021
  • US launches new cyber center and what it means

    cyber security concept

    EXECUTIVE SUMMARY: In order for organizations to function effectively, cyber security is a must. Developing and implementing the right solutions can prevent breaches, both now and in the future. With these ideas at the forefront, the US government announced the launch of a joint cyber center, which will uphold collaborative initiatives involving the Space and […]

    Source: CyberTalk | Published: Apr 28, 2021
  • A cyber attack on an NBA team, the surprising reality

    Cyber attack, NBA, Houston Rockets

    EXECUTIVE SUMMARY: These players are staying on their toes. A cyber attack has hit an NBA team; one of the 30 teams included in the USA’s National Basketball Association. Forensics investigators hired by the Houston Rockets are collaborating with the FBI to detangle the exact nature and full extent of the security event. Doing so […]

    Source: CyberTalk | Published: Apr 27, 2021
  • Mobile devices as strong as military tanks?

    Rugged Android phones

    EXECUTIVE SUMMARY: The world’s largest construction equipment manufacturer, Caterpillar, is diving into Android device assembly. Caterpillar’s rugged Android phones are intended for a very specific user group; those engaged in industrial work. However, those who work in the healthcare setting may also benefit. The company’s latest Android model, the Cat S42 H+, is so durable […]

    Source: CyberTalk | Published: Apr 27, 2021
  • Major US breaches prompt focus on zero trust model

    zero trust architecture, USA and cyber security concept

    EXECUTIVE SUMMARY: In December, the US discovered a massive breach that affected networks and devices belonging to US government agencies. Given the breadth and depth of this attack, current and former officials advocate for cyber security reforms and a new approach that assumes hackers have already burrowed into computer systems. “We’ve got to run a […]

    Source: CyberTalk | Published: Apr 26, 2021
  • Advanced data security insights with expert Patrik Honegger

    Patrik Honegger

    Patrik Honegger has worked in the IT sector since the 90’s and has specialized in the IT security field since 2000. He joined Check Point in 2001. Since joining Check Point, he has been involved in the full array of the company’s solutions and customer sectors and maintains a deep technological understanding of products and […]

    Source: CyberTalk | Published: Apr 23, 2021