OSINTer logo Article Overview

SecurityWeek

Now Live: SecurityWeek Threat Intelligence Summit Virtual Event

SecurityWeek will host its 2022 Threat Intelligence Summit as a fully immersive virtual event on May 18, 2022.



OSINTer logo Article Overview

SecurityWeek

SecurityWeek to Host Threat Intelligence Summit Virtual Event on May 18th

SecurityWeek will host its 2022 Threat Intelligence Summit as a fully immersive virtual event on May 18, 2022.







OSINTer logo Article Overview

SecurityWeek

SecurityWeek Cyber Insights 2024 Series

Cyber Insights 2024 Series is based on discussions with hundreds of cybersecurity experts from dozens of companies covering multiple topics.




OSINTer logo Article Overview

SecurityWeek

Webinar Today: Managing IoT/OT Visibility, Protection and Monitoring in a Zero Trust Environment

Join SecurityWeek and Microsoft this webinar to learn about live zero trust enablement through monitoring and automation of IoT/OT environments.





OSINTer logo Article Overview

SecurityWeek

Podcast: Palo Alto Networks Talks IT/OT Convergence

In this podcast, SecurityWeek talks to Del Rodillas from Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape.




OSINTer logo Article Overview

SecurityWeek

Video: Fireside Chat With Shane Huntley, Director at Google's Threat Analysis Group

Shane Huntley, Director of Google's TAG (Threat Analysis Group), joins SecurityWeek editor-at-large Ryan Naraine for a frank discussion on threat intelligence at SecurityWeek's 2022 Threat Intelligence Summit.












OSINTer logo Article Overview

SecurityWeek

Ethical AI, Possibility or Pipe Dream?

SecurityWeek spoke with IBM's chief privacy officer (CPO) Christina Montgomery to seek a better understanding of the issues surrounding ethical artificial intelligence














OSINTer logo Article Overview

SecurityWeek

The Art Exhibition That Fools Facial Recognition Systems

SecurityWeek has compiled a list of tools and other resources that can be useful for defenders concerned about the impact of the Log4Shell vulnerability on their organization.


OSINTer logo Article Overview

SecurityWeek

Russia, Ukraine and the Danger of a Global Cyberwar

SecurityWeek has compiled a list of tools and other resources that can be useful for defenders concerned about the impact of the Log4Shell vulnerability on their organization.


OSINTer logo Article Overview

SecurityWeek

Can Tech Visionary Elon Musk Spur Cybersecurity Innovation at Twitter?

SecurityWeek has compiled a list of tools and other resources that can be useful for defenders concerned about the impact of the Log4Shell vulnerability on their organization.


OSINTer logo Article Overview

DataBreaches

Slovak, Polish Parliaments Hit by Cyberattacks

DataBreaches recently noted a news report that the Slovak parliament had to suspend voting due to a cyberattack. It wasn’t just the Slovak parliament,...
















OSINTer logo Article Overview

SecurityWeek

Data Stolen in Breach at Security Company Entrust

Entrust suffered a data breach last month and the security company has confirmed that the attackers have stolen some files.








OSINTer logo Article Overview

DataBreaches

‘JekyllBot:5’ Vulnerabilities Allow Remote Hacking of Hospital Robots

Eduard Kovacs reports: Cybersecurity researchers specializing in healthcare IoT systems have discovered five serious vulnerabilities that can be exploited to...





OSINTer logo Article Overview

DataBreaches

Over 300,000 Internet-Exposed Databases Identified in 2021

Ionut Arghire reports: Cybersecurity firm Group-IB identified more than 91,000 publicly-exposed databases in the first quarter of 2022, significantly more than...





OSINTer logo Article Overview

SecurityWeek

Cyber Madness Bracket Challenge - Register to Play

SecurityWeek’s Cyber Madness Bracket Challenge brings the community together in a fun, competitive way through the NCAA basketball tournament







OSINTer logo Article Overview

SecurityWeek

Webinar Tomorrow: Exposing Common Myths of OT Cybersecurity

Webinar: By unveiling the realities of OT cybersecurity, we can cut through the noise and understand challenges associated with protecting critical infrastructure.








OSINTer logo Article Overview

DataBreaches

Albanian IT Staff Charged With Negligence Over Cyberattack

AP reports: Albanian prosecutors on Wednesday asked for the house arrest of five public employees they blame for not protecting the country from a cyberattack...


OSINTer logo Article Overview

SecurityWeek

Webinar Today: Applying a Zero Trust Framework to Employee Login Controls

Zero Trust webinar to address challenges and trends organizations face when adopting a zero-trust approach











Loading more articles....