Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!
Never-fail best practices when hiring a security researcher

Micki Boland is a global cyber security warrior and evangelist with Check Point Technologies’ Office of the CTO. Micki has over 20 years in ICT, cyber security, emerging technology and innovation. Micki’s focus is helping customers, system integrators, and service providers reduce risk through the adoption of emerging cyber security technologies. Micki is an ISC2 […]
7 security and technology white papers to read right now

EXECUTIVE SUMMARY: Are you in charge of leading change? Drive sustainable infrastructure development at speed and scale by deploying fully-researched, future-proof policies, processes and products recommended and curated for you by a community of knowledgeable experts. CyberTalk.org’s collection of white papers provides you with out-of-the-box, in-depth risk mitigation and resilience strategies that can help you […]
Wide range of routers under attack by unusually sophisticated malware

EXECUTIVE SUMMARY: Across North America and Europe, an advanced hacking group has dedicated nearly two years to the pursuit of infecting routers with malware. This particular type of malware can take full control over connected devices running Windows, macOS and Linux, according to security researchers. At present, as many as 80 different targets have been […]
The looming threat of AI-powered ransomware

By Zac Amos, Features Editor, Rehack.com. Many people don’t think of ransomware powered by artificial intelligence as a security threat. But, it’s only a matter of time before cyber criminals worldwide figure out how to use the technology for their benefit. Here is a discussion about the looming threat presented by AI-powered ransomware and how businesses […]
Microsoft 365 now prevents data leaks with session timeouts

EXECUTIVE SUMMARY: Microsoft recently announced the general availability of tenant-wide idle session timeouts for Microsoft 365 web page apps. This is intended to protect confidential information on shared or non-company devices that may unintentionally be left unattended for long stretches of time. When switched on, the session timeout capability ensures that sensitive information cannot easily […]
The best travel security tips from a bona-fide CISO!

Pete Nicoletti, Field CISO – Americas, Check Point Software. The following 31 travel tips should make your journey safer and more productive! As a CISO who travels the world for both business and pleasure, these insights are experience-earned and I am eager to share them with you. Before Travel: 1. Research the particular travel challenges […]
Summer travel: 8 cyber security tips so that you can have more fun

EXECUTIVE SUMMARY: Looking forward to celebrating the summer season with epic outdoor escapes that inspire, entertain and awe? As you daydream about natural landscapes, adrenaline-filled adventures or picturesque family picnics, hackers are dreaming about how to break into your environment. Let’s visit wild places, seek adventures and conquer cyber security – all at the same […]
Actionable Zero Trust info to help you actualize a better security strategy

Mazhar Hamayun is a cyber security professional with over 20 years of hands-on technology and leadership experience. At Check Point Software, Mazhar works as a cyber security engineer and in the Office of the CTO, committed to helping different organizations achieve success in both strategic and technical initiatives while contributing to Check Point’s own security […]
Google sends alert about “Hermit” spyware on Android and iOS devices

EXECUTIVE SUMMARY: Google has issued an alert concerning government-grade spyware on phones. The company warns that select international governments are leveraging this technology to hack into iOS and Android phones for surveillance purposes. The spyware in question was developed by RCS Lab, a Milan-based ‘lawful intercept’ company. ‘Lawful intercept’ means that RCS Lab can only […]
Where does my CISO live?

Edwin Doyle, Global Cyber Security Evangelist, Check Point Software. Within your organization, who does the CISO report to? Research shows that the majority of organizations need to carefully assess or reassess the CISO’s reporting relationship. According to the IANS annual CISO Compensation and Budget Survey, nearly 70% of CISOs report to a technical manager. More […]
The overlooked keys to success within the modern CISO role

EXECUTIVE SUMMARY: The cyber security landscape is fast-evolving and security represents a critical concern for companies in every industry. The threats are increasing. Businesses are facing more pressure than ever before to get data management right. But CISOs and executive teams are prone to stumbling in this one area…Here’s what every business leader needs to […]
Nichirin automotive group shuts down controls due to ransomware attack

EXECUTIVE SUMMARY: Automotive hose maker Nichirin, headquartered in Japan, reports that a US subsidiary has encountered a ransomware attack. Computerized controls were shut down as quickly as possible. The group transferred to manual production and shipping in order to continue business processes. This ransomware attack illustrates the growing importance of supply chain security across all […]