www.scmagazine.com
Open in
urlscan Pro
2606:4700:20::681a:d13
Public Scan
URL:
https://www.scmagazine.com/
Submission Tags: falconsandbox
Submission: On June 26 via api from US — Scanned from DE
Submission Tags: falconsandbox
Submission: On June 26 via api from US — Scanned from DE
Form analysis
1 forms found in the DOM<form class="w-100" scmag-registration="set">
<div class="my-2 font-body"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
<div class="fs-9 my-4">
<p>By clicking the Subscribe button below, you agree to SC Media
<a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use" data-feathr-click-track="true" data-feathr-link-aids="60071024bdb3f8d0470da8d6">Terms and Conditions</a><span> and
</span><a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy" data-feathr-click-track="true" data-feathr-link-aids="60071024bdb3f8d0470da8d6">Privacy Policy</a>.</p>
</div>
<div class="row"><button type="submit" class="col-6 btn btn-primary">Subscribe</button></div>
</form>
Text Content
Log inRegister CISO Stories Topics Events Podcasts Research Recognition Leadership About Open Search Bar CYBERSECURITY NEWS, AWARDS, WEBINARS, ESUMMITS, RESEARCH ADVERTISEMENT (Stock Photo, Getty Images) FROM THE PERIMETER TO SASE: THE EVOLUTION OF NETWORK SECURITY Paul WagenseilJune 21, 2024 How network security has rapidly evolved in the past decade, and what it means for your organization. INCIDENT RESPONSE TEAM BURNOUT AND RESOURCE CONSTRAINTS GIVE ATTACKERS THE ADVANTAGE ADVERTISEMENT RESOURCES * AI/ML EXECUTIVES BULLISH ABOUT AI CAPABILITIES, BUT WORRY ABOUT DATA PRIVACY AND SECURITY * Identity AUTOMATED (PKI) INFRASTRUCTURE: THE AI YOU SHOULD BE THINKING ABOUT * Identity THE THREAT OF DEEPFAKES TO REMOTE IDENTITY VERIFICATION SYSTEMS * Identity THE FUTURE OF IDENTITY MANAGEMENT: TRANSITIONING FROM OPERATIONAL TO INTELLIGENT PLATFORMS * Ransomware WHAT THE SOPHOS/TENABLE PARTNERSHIP SAYS ABOUT THE FUTURE OF THE CYBERSECURITY INDUSTRY PODCASTS * Ransomware BALTIMORE, GPS JAMMED, US BANS, ARM, YOUTUBE, KRAKEN AND JOSHUA MARPET – SWN #394 * Leadership CISOS ADVISING CYBERSECURITY COMPANIES, GET ON BOARD! – BOB WEST – CSP #180 * Application security SHARED RESPONSIBILITY MODELS, AI IN OFFENSIVE SECURITY, APPLE’S PRIVATE CLOUD COMPUTE – ASW #289 * Application security BUILDING A SUCCESSFUL API SECURITY STRATEGY – LUKE BABARINDE – BSW #354 * AI/ML AI AT WORK 2024: C-SUITE PERSPECTIVES ON ARTIFICIAL INTELLIGENCE – BHAWNA SINGH – BSW #354 FEATURED CALL FOR 2024 SC AWARDS NOMINATIONS GET DAILY EMAIL UPDATES SC Media's daily must-read of the most current and pressing daily news Business Email By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy. Subscribe PERSPECTIVES * NINE WAYS CONSTRUCTION COMPANIES CAN MODERNIZE AND MITIGATE CYBER RISKS David Balaban June 26, 2024 * FOSTER A COLLABORATIVE SECURITY CULTURE TO AVOID BECOMING THE ‘CHIEF INCIDENT SCAPEGOAT OFFICER’ Nick Lines June 25, 2024 * IDENTITY: THE COMMON DENOMINATOR BEHIND CDK AND OTHER RECENT BREACHES John-Paul Cunningham June 24, 2024 * IN TODAY’S WORLD, PEOPLE WANT TO KNOW WHAT’S GOING ON WITH THEIR PERSONAL DATA Paul Laudanski June 21, 2024 * HOW AI CAN MAKE IT LESS FRUSTRATING FOR EMPLOYEES TO REPORT MALICIOUS EMAILS Mike Britton June 20, 2024 More Perspectives IN BRIEF * ATTEMPTED RUSSIAN INTERFERENCE IN UK POLLS STILL LOW SC Staff June 26, 2024 * PEGASUS SERVERS SEQUESTERED IN POLAND SC Staff June 26, 2024 * MALVERTISING CAMPAIGN DEPLOYS OYSTER BACKDOOR VIA TROJANIZED SOFTWARE INSTALLERS SC Staff June 26, 2024 * US CHARGES FIN9 HACKERS FOR HACKING SPREE SC Staff June 26, 2024 * UNIQUE MALWARE SAMPLES SPIKE SC Staff June 26, 2024 More Briefs MORE RESOURCES * MANAGED RISK SERVICES: HOW THE PIECES FIT TOGETHER George V. Hulme June 11, 2024 * RISE OF PARTNERSHIPS, INDUSTRY COLLABORATION DESIGNED TO BREAK THROUGH VULNERABILITY WALL George V. Hulme June 7, 2024 * ENTERPRISE VULNERABILITY MANAGEMENT HAS HIT A WALL: WHAT YOU NEED TO KNOW George V. Hulme June 7, 2024 * RANSOMWARE AGAINST HEALTHCARE AND MANUFACTURING ON THE RISE: WHAT TO KNOW, HOW TO RESPOND George V. Hulme May 30, 2024 * HOW TO IMPROVE RANSOMWARE ATTACK OUTCOMES George V. Hulme May 28, 2024 MORE RESOURCES Ransomware CDK GLOBAL OUTAGE LIKELY TO LAST UNTIL JULY, AS RANSOM DEMAND LOOMS Laura FrenchJune 26, 2024 The cyberattack attributed to BlackSuit continues to cause turmoil for car dealerships across the US. Threat Intelligence GOOGLE DETAILS NIGHTMARE WHACK-A-MOLE SCENARIO WITH DRAGONBRIDGE DISINFO CAMPAIGN Shaun NicholsJune 26, 2024 Researchers with Google’s security arm say they have been dealing with a particularly nasty Chinese disinformation group responsible for hundreds of thousands of malicious accounts. Data Security PENTAGON TAKEN TO TASK OVER BACKGROUND CHECK SECURITY Shaun NicholsJune 25, 2024 The Department of Defense is facing criticism over its handling of background check data. Malware CLOUD-BASED WORM NOW SPEWS RANSOMWARE AND CRYPTOMINER GLOOM Steve ZurierJune 25, 2024 Security pros say teams need to monitor for changes in the threat landscape and gain visibility to this evolving malware trend via frequent audits and purple team exercises. AI/ML GOOGLE FRAMEWORK HELPS LLMS PERFORM BASIC VULNERABILITY RESEARCH Laura FrenchJune 24, 2024 “Project Naptime” enables models like ChatGPT to perform up to 20x better than in previous attempts. Data Security LEVI’S CAUGHT WITH PANTS DOWN: HACKERS EXPOSE 72,000 CUSTOMER ACCOUNT DETAILS Shaun NicholsJune 24, 2024 Clothing company Levi Strauss said some 72,000 customer accounts have come under attack from threat actors. Ransomware DEADLINE LOOMS FOR ALLEGED LOCKBIT EXTORTION OF FEDS OVER 33TB OF DATA Steve ZurierJune 24, 2024 Ransomware group reportedly told the U.S. government that it has until tomorrow to negotiate a deal or they will make the data public. Critical Infrastructure Security CONGRESS FLOATS MEASURE TO BLOCK CHINESE CHIPMAKING EQUIPMENT Shaun NicholsJune 21, 2024 The U.S. Congress pushes measure to crack down on chipmaking equipment from China. Load More EVENTS * Cybercast KEY GRC PRIORITIES FOR THE SECOND HALF OF 2024 Wed Jul 10 * Cybercast GOVERNANCE, RISK, AND COMPLIANCE: THE CISO PERSPECTIVE Thu Jul 11 * Cybercast HOW TO DEPLOY CYBER APPLICATIONS ON YOUR SECURITY DATA LAKE Wed Jul 17 * Cybercast CISO INSIGHTS: NAVIGATING THE GRC LANDSCAPE Thu Jul 18 * Virtual Conference PARTNER OR PROBLEM? SECURING THIRD-PARTY RELATIONS IN THE AGE OF SUPPLY-CHAIN ATTACKS Tue Jul 23 ADVERTISEMENT -------------------------------------------------------------------------------- ABOUT US SC MediaCyberRisk AllianceContact UsCareersPrivacy GET INVOLVED SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us EXPLORE Product reviewsResearchWhite papersWebcastsPodcasts Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions. COOKIES This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies. Accept cookies