Home RSS Feed

RSS Feed

Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!

Click here to copy Url for RSS Reader
  • National network of surveillance cameras, the next big thing in cyber security?

    CCTV cameras outside

    EXECUTIVE SUMMARY: In the United States, police departments in more than 1,000 cities are now relying on a national network of surveillance cameras. The cameras capture license plate information, along with people, cars, animals and cyclists. The Atlanta-based start-up that markets the cameras says that they help police departments collect evidence. The cameras not only […]

    Source: CyberTalk | Published: Mar 8, 2021
  • Supply chain attack strikes airlines and how to prepare for the future

    Airline supply chain attack

    EXECUTIVE SUMMARY: A series of international airlines have been affected by a serious supply chain attack. The scope of the attack is concerning. Details are still emerging. In the past year, broadly speaking, the aviation industry has seen a sharp spike in cyber attacks. Aviation groups represent appealing targets due to the troves of personal […]

    Source: CyberTalk | Published: Mar 5, 2021
  • Life’s a breach & what to do?

    Eddie Doyle, Check Point Software

    Contributed by Edwin Doyle, Global Security Strategist, Check Point Software.  EXECUTIVE SUMMARY: Data breaches are a costly problem for companies, setting them back about $3.86 million/data breach, according to an IBM study. One of the main factors affecting the cost of data breaches is the time it takes to detect and contain them. On average, […]

    Source: CyberTalk | Published: Mar 5, 2021
  • Vaccine scheduling websites and beyond: Violating data privacy rules?

    Cloud computing concept, vaccine scheduling website idea

    EXECUTIVE SUMMARY: Vaccine scheduling websites and healthcare technology designed for coronavirus prevention and are under international scrutiny. In Europe, advocacy groups are concerned that certain online platforms fail to protect the privacy of citizens. In France, nonprofits are petitioning courts to weigh in. Medical unions, open-source software organizations and human rights groups argue that using […]

    Source: CyberTalk | Published: Mar 5, 2021
  • Attacks targeting Microsoft Exchange Server and supercharging your security

    Microsoft Exchange Server Concept

    EXECUTIVE SUMMARY: Microsoft Exchange Server, Update Now Four zero-day exploits were recently used in a limited number of targeted attacks, according to Microsoft. The cyber attackers leveraged the bugs in on-premise Exchange servers for the purpose of probing email accounts. At least one of the zero-days enabled attackers to obtain the complete contents of several […]

    Source: CyberTalk | Published: Mar 4, 2021
  • 5 ways virtual reality can accelerate success in business and life

    Person exploring virtual reality

    EXECUTIVE SUMMARY: As business leaders recognize its potential, virtual reality (VR) is rapidly gaining traction. By 2030, virtual reality’s contributions to worldwide GDP will likely surpass $450 billion, according to PwC. The technology may also ultimately support more than 20 million jobs. The recent expansion of remote work has quickly advanced virtual reality programs and […]

    Source: CyberTalk | Published: Mar 4, 2021
  • How cloud technologies drive innovation and digital transformation

    Maya Levine, Check Point Software

    EXECUTIVE SUMMARY: At the industry-leading global cyber event, CPX 360 2021, thousands of guests watched the presentations delivered by some of the best cloud security experts of our era. Understanding cloud complexity and design is key in leading a successful 21st century enterprise. Cloud security expert and Check Point Technical Marketing Engineer Maya Levine offered […]

    Source: CyberTalk | Published: Mar 3, 2021
  • Ryuk ransomware and a new twist that everyone hates

    Ryuk ransomware with worm-like capabilities, concept art

    EXECUTIVE SUMMARY: Ryuk ransomware, with self-replicating worm-like features In early 2021, a new version of Ryuk ransomware burst onto the scene. According to the French National Agency for the Security of Information Systems (ANSSI), the virus retains self-replicating worm-like capabilities. This compounds the criticality of infections. The worm-like capabilities are achieved “through the use of […]

    Source: CyberTalk | Published: Mar 3, 2021
  • Countering coronavirus chaos, attacks on global pandemic response organizations

    Coronavirus global health pandemic concept

    EXECUTIVE SUMMARY: Around the world, coronavirus research units and vaccine manufacturers are experiencing cyber attacks. Gaps and vulnerabilities in technological infrastructure enable these activities. The increase in attacks on critical organizations is worrisome. If further cyber attacks are successful, what will become of public trust? Will these organizations still be perceived as purveyors of a […]

    Source: CyberTalk | Published: Mar 2, 2021
  • Cloud infrastructure, key considerations for financial services groups

    Cloud computing concept

    EXECUTIVE SUMMARY: How are cloud players trying to entice industries to transfer business functions to cloud platforms? AWS for financial services and Azure for financial services are expanding their offerings into industry-specific domains. As a financial group, should you embrace these new types of cloud services? In this blog post, we’ll discuss the pros, cons […]

    Source: CyberTalk | Published: Mar 1, 2021
  • Dispo: A camera app’s wide exposure, overnight success and competitive edge

    Person taking photograph on smart phone

    EXECUTIVE SUMMARY: Did you believe that disposable cameras were a relic of the past, like VCRs or overhead projectors (which began to disappear around the same time)? Think again. This photo sharing app, designed to mimic a disposable camera, has more than 2.5 million downloads. Dispo is turning the ‘down with disposable cameras’ trend on […]

    Source: CyberTalk | Published: Mar 1, 2021
  • The fuzziness of detecting payload attacks

    Eddie Doyle, Payload Attacks

    Contributed by Edwin Doyle, Global Security Strategist, Check Point Software.  EXECUTIVE SUMMARY: As seen in the contrast between phishing and spear phishing, targeted cyber attacks are considerably more effective at compromising systems and data than more general attacks. Targeted attacks are starting to get much quite sophisticated. Cyber criminals can discover a lot about your […]

    Source: CyberTalk | Published: Feb 26, 2021