CSO First Look: Cybersecurity News

"Cybersecurity in Ukraine:  How Ukraine infosec community is coping."

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents.  Accessed on 28 February 2023 1412 UTC. Content provided by "CSO First Look."

Source:  https://mail.google.com/mail/u/0/#inbox/FMfcgzGrcrmdLNzJDXzTDdPvhXbZWWXr (Cybersecurity News from "CSO First Look").

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybersecurityjournal.net and https://paper.li/RussellRoberts).


The day's top cybersecurity news and in-depth coverage


28 FEBRUARY, 2023

Cybersecurity in wartime: how Ukraine's infosec community is coping

A year into the war, resilience and adaptation, risk and sacrifice are the hallmarks of being a cybersecurity professional in Ukraine.

Image: Sponsored by Roar B2B Limited: Are you ready to take on these challenges at UK Cyber Week – Expo & Conference 2023

Sponsored by Roar B2B Limited: Are you ready to take on these challenges at UK Cyber Week – Expo & Conference 2023

Whether you're a cyber security or IT expert, or just starting out, we invite you to join us and experience the excitement of Capture the Flag, Battle Bots, Lockpicking Village, Cyber Escape Room, and a lot more, all taking place at UK Cyber Week - Expo & Conference this April! Get your free ticket today!

US warns of cyberattacks by Russia on anniversary of Ukraine war

The US Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory about stepped-up Russian 'disruptive' actions right after Ukraine detected a cyberattack on government websites.

Backdoor deployment overtakes ransomware as top attacker action

Thanks to the availability of malware such as Emotet, deploying backdoors on victims' networks is becoming easier and more lucrative for cybercriminals.

Entitle debuts with automated SaaS permissions-management application

Israel-based cybersecurity startup Entitle's namesake application is designed to automate access requests and grants by delegating approval decisions to business owners instead of IT and devops teams.

What is Traffic Light Protocol? Here's how it supports CISOs in sharing threat data

Traffic Light Protocol (TLP) provides CISOs with best practice guidance on how to share sensitive data within an organization or externally. Here is how to use TLP and more on the latest version, TLP 2.0.

© 2023 CSO
IDG Communications Ltd.,
101 Euston Road,
London NW1 2RA,
United Kingdom


Popular posts from this blog

SecurityWeek Briefing.

SecurityWeek Briefing.

Cyber War News Wire.