Skip to main content

Securing the Metaverse and Web3

MITRE's List of 25 Most Dangerous Vulnerabilities:
  Your SecurityWeek Briefing Webcasts
RSS Feed
06.29.22


Wednesday, June 29, 2022


Crytica Dwell Time


The Dwell Time Revolution Begins Now

You can dramatically reduce APT, Zero-Day, and Malware Infection "dwell time" from 180 Days to less than 180 Seconds with Crytica Security's new Zero-Day Detection™ capabilities.

Learn more



Cyber-Physical Security: Benchmarking to Advance Your Journey
Over the last few years, the pandemic and work from home paradigm shift have accelerated the convergence of IT and OT networks and necessitated a consolidated strategy to address cyber risks across cyber-physical systems (CPS).
Read the Full Column
by Galina Antova


Security Orchestration: Beware of the Hidden Financial Costs
Security orchestration is about getting multiple systems in the Security Operations Center (SOC) to work together so you can detect, remediate and respond across the infrastructure.
Read the Full Column
by Marc Solomon



Hybrid Networks Require an Integrated On-prem and Cloud Security Strategy
Digital acceleration, user demand, and shifting business strategies add new edges to the network, making it increasingly difficult to manage and even harder to secure.
Read the Full Column
by John Maddison



Using the Defense Readiness Index to Improve Security Team Skills
The Defense Readiness Index is a reliable alternative for assessing a security team's skill level, developing a roadmap for improving cyber competencies, and reaching the optimal level of cyber security readiness.
Read the Full Column
by Jeff Orloff



Lessons for Better Fraud Decision-Making
We can learn a valuable lesson about better fraud decision-making from restaurant choosing scenarios.
Read the Full Column
by Joshua Goldfarb








Crytica Dwell Time


The Dwell Time Revolution Begins Now

You can dramatically reduce APT, Zero-Day, and Malware Infection "dwell time" from 180 Days to less than 180 Seconds with Crytica Security's new Zero-Day Detection™ capabilities.

Learn more




See All Recent Articles at SecurityWeek.Com

Crytica Dwell Time

Securing the Metaverse and Web3: Security must be baked into the metaverse right from the start – and that begins with conversations and decisions, now, when there's still time to be thoughtful and to make a cross-industry impact. Read More

MITRE Publishes 2022 List of 25 Most Dangerous Vulnerabilities: MITRE has published the 2022 CWE top 25 most dangerous software weaknesses, based on an analysis of 38,000 CVEs from the previous two years. Read More

Azure Service Fabric Vulnerability Can Lead to Cluster Takeover: A vulnerability in Azure Service Fabric allows an attacker to escalate privileges and take over entire Linux clusters. Read More

Firefox 102 Patches 19 Vulnerabilities, Improves Privacy: The latest browser iteration mitigates query parameter tracking when Enhanced Tracking Protection strict mode is enabled. Read More

CISA Calls for Expedited Adoption of Modern Authentication Ahead of Deadline: With Basic Auth's demise looming, federal agencies and private organizations alike should accelerate the adoption of Modern Auth, CISA says. Read More

CISA-Funded Project Enables Students With Disabilities to Learn Cybersecurity: The new CISA-funded effort is aimed at blind and visually impaired students who want to pursue careers in cybersecurity. Read More

Normalyze Announces $22 Million for DSPM Technology Normalyze closes a $22 million funding round as venture capitalists rush to place bets on the newly coined Data Security Posture Management (DSPM) space. Read More

Google Introduces New Capabilities for Cloud Armor Web Security Service: Google expands Cloud Armor features with adaptive protection, bot defense, new edge security policies, rate limiting, and support for proxy load balancers. Read More

CISA Says 'PwnKit' Linux Vulnerability Exploited in Attacks: CISA says the Linux vulnerability tracked as CVE-2021-4034 and PwnKit has been exploited in attacks. Read More

Cyolo Banks $60M Series B for ZTNA Technology: Israeli startup Cyolo raises a massive Series B round to compete in the market for zero trust networking access. Read More

Chinese Threat Actor Targets Rare Earth Mining Companies in North America, Australia: A Chinese threat actor has been conducting influence campaigns targeting rare earth mining companies in Australia, Canada, and the United States. Read More

New Database Catalogs Cloud Vulnerabilities, Security Issues: Cloud security firm Wiz has announced the launch of an open database whose goal is to catalog vulnerabilities and other security issues affecting cloud services. Read More

Crytica Dwell Time





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2022 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

ICS Cybersecurity Conference: Save $600 and register by April 30th

Registration & CFP Now Open for ICSCC25 – Don't Miss the ICS Pioneer Rate! Registration and CFP are Open! Buy your ticket by 4/30 and Save $600 Greetings! We’re excited to announce that registration and the Call for Presentations (CFP) are officially open for SecurityWeek's 2025 ICS Cybersecurity Conference. We’re returning to the beautiful InterContinental Atlanta from  October 27–30, 2025 , for another unforgettable week of expert insights, hands-on learning, and valuable connections with peers and innovators in the industrial cybersecurity space. Purchase your ticket by April 30th to get the ICS Pioneer Rate of $1795 -- a savings of $600 on a full conference pass. (GOV rate of $1595) Are you ready to share your expertise, lessons learned, or groundbreaking research with the community? The Call for Presentations (CFP) is open and we’re accepting proposals fo...