www.scmagazine.com Open in urlscan Pro
2606:4700:20::681a:d13  Public Scan

URL: https://www.scmagazine.com/
Submission Tags: falconsandbox
Submission: On June 26 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="w-100" scmag-registration="set">
  <div class="my-2 font-body"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="fs-9 my-4">
    <p>By clicking the Subscribe button below, you agree to SC Media
      <a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use" data-feathr-click-track="true" data-feathr-link-aids="60071024bdb3f8d0470da8d6">Terms and Conditions</a><span> and
      </span><a class="text-underline" target="_blank" href="https://www.cyberriskalliance.com/terms-of-use#privacy-policy" data-feathr-click-track="true" data-feathr-link-aids="60071024bdb3f8d0470da8d6">Privacy Policy</a>.</p>
  </div>
  <div class="row"><button type="submit" class="col-6 btn btn-primary">Subscribe</button></div>
</form>

Text Content

Log inRegister
CISO Stories
Topics
Events
Podcasts
Research
Recognition
Leadership
About
Open Search Bar


CYBERSECURITY NEWS, AWARDS, WEBINARS, ESUMMITS, RESEARCH

ADVERTISEMENT



(Stock Photo, Getty Images)


FROM THE PERIMETER TO SASE: THE EVOLUTION OF NETWORK SECURITY

Paul WagenseilJune 21, 2024

How network security has rapidly evolved in the past decade, and what it means
for your organization.

INCIDENT RESPONSE TEAM BURNOUT AND RESOURCE CONSTRAINTS GIVE ATTACKERS THE
ADVANTAGE

ADVERTISEMENT



RESOURCES

 * AI/ML
   
   EXECUTIVES BULLISH ABOUT AI CAPABILITIES, BUT WORRY ABOUT DATA PRIVACY AND
   SECURITY

 * Identity
   
   AUTOMATED (PKI) INFRASTRUCTURE: THE AI YOU SHOULD BE THINKING ABOUT

 * Identity
   
   THE THREAT OF DEEPFAKES TO REMOTE IDENTITY VERIFICATION SYSTEMS

 * Identity
   
   THE FUTURE OF IDENTITY MANAGEMENT: TRANSITIONING FROM OPERATIONAL TO
   INTELLIGENT PLATFORMS

 * Ransomware
   
   WHAT THE SOPHOS/TENABLE PARTNERSHIP SAYS ABOUT THE FUTURE OF THE
   CYBERSECURITY INDUSTRY

PODCASTS

 * Ransomware
   
   BALTIMORE, GPS JAMMED, US BANS, ARM, YOUTUBE, KRAKEN AND JOSHUA MARPET – SWN
   #394

 * Leadership
   
   CISOS ADVISING CYBERSECURITY COMPANIES, GET ON BOARD! – BOB WEST – CSP #180

 * Application security
   
   SHARED RESPONSIBILITY MODELS, AI IN OFFENSIVE SECURITY, APPLE’S PRIVATE CLOUD
   COMPUTE – ASW #289

 * Application security
   
   BUILDING A SUCCESSFUL API SECURITY STRATEGY – LUKE BABARINDE – BSW #354

 * AI/ML
   
   AI AT WORK 2024: C-SUITE PERSPECTIVES ON ARTIFICIAL INTELLIGENCE – BHAWNA
   SINGH – BSW #354


FEATURED

CALL FOR 2024 SC AWARDS NOMINATIONS


GET DAILY EMAIL UPDATES

SC Media's daily must-read of the most current and pressing daily news
Business Email

By clicking the Subscribe button below, you agree to SC Media Terms and
Conditions and Privacy Policy.

Subscribe


PERSPECTIVES

 * NINE WAYS CONSTRUCTION COMPANIES CAN MODERNIZE AND MITIGATE CYBER RISKS
   
   David Balaban
   
   June 26, 2024

 * FOSTER A COLLABORATIVE SECURITY CULTURE TO AVOID BECOMING THE ‘CHIEF INCIDENT
   SCAPEGOAT OFFICER’
   
   Nick Lines
   
   June 25, 2024

 * IDENTITY: THE COMMON DENOMINATOR BEHIND CDK AND OTHER RECENT BREACHES
   
   John-Paul Cunningham
   
   June 24, 2024

 * IN TODAY’S WORLD, PEOPLE WANT TO KNOW WHAT’S GOING ON WITH THEIR PERSONAL
   DATA  
   
   Paul Laudanski
   
   June 21, 2024

 * HOW AI CAN MAKE IT LESS FRUSTRATING FOR EMPLOYEES TO REPORT MALICIOUS EMAILS
   
   Mike Britton
   
   June 20, 2024

More Perspectives


IN BRIEF

 * ATTEMPTED RUSSIAN INTERFERENCE IN UK POLLS STILL LOW
   
   SC Staff
   
   June 26, 2024

 * PEGASUS SERVERS SEQUESTERED IN POLAND
   
   SC Staff
   
   June 26, 2024

 * MALVERTISING CAMPAIGN DEPLOYS OYSTER BACKDOOR VIA TROJANIZED SOFTWARE
   INSTALLERS
   
   SC Staff
   
   June 26, 2024

 * US CHARGES FIN9 HACKERS FOR HACKING SPREE
   
   SC Staff
   
   June 26, 2024

 * UNIQUE MALWARE SAMPLES SPIKE
   
   SC Staff
   
   June 26, 2024

More Briefs


MORE RESOURCES

 * MANAGED RISK SERVICES: HOW THE PIECES FIT TOGETHER
   
   George V. Hulme
   
   June 11, 2024

 * RISE OF PARTNERSHIPS, INDUSTRY COLLABORATION DESIGNED TO BREAK THROUGH
   VULNERABILITY WALL
   
   George V. Hulme
   
   June 7, 2024

 * ENTERPRISE VULNERABILITY MANAGEMENT HAS HIT A WALL: WHAT YOU NEED TO KNOW
   
   George V. Hulme
   
   June 7, 2024

 * RANSOMWARE AGAINST HEALTHCARE AND MANUFACTURING ON THE RISE: WHAT TO KNOW,
   HOW TO RESPOND
   
   George V. Hulme
   
   May 30, 2024

 * HOW TO IMPROVE RANSOMWARE ATTACK OUTCOMES
   
   George V. Hulme
   
   May 28, 2024

MORE RESOURCES
Ransomware

CDK GLOBAL OUTAGE LIKELY TO LAST UNTIL JULY, AS RANSOM DEMAND LOOMS

Laura FrenchJune 26, 2024

The cyberattack attributed to BlackSuit continues to cause turmoil for car
dealerships across the US.

Threat Intelligence

GOOGLE DETAILS NIGHTMARE WHACK-A-MOLE SCENARIO WITH DRAGONBRIDGE DISINFO
CAMPAIGN

Shaun NicholsJune 26, 2024

Researchers with Google’s security arm say they have been dealing with a
particularly nasty Chinese disinformation group responsible for hundreds of
thousands of malicious accounts.

Data Security

PENTAGON TAKEN TO TASK OVER BACKGROUND CHECK SECURITY

Shaun NicholsJune 25, 2024

The Department of Defense is facing criticism over its handling of background
check data.


Malware

CLOUD-BASED WORM NOW SPEWS RANSOMWARE AND CRYPTOMINER GLOOM

Steve ZurierJune 25, 2024

Security pros say teams need to monitor for changes in the threat landscape and
gain visibility to this evolving malware trend via frequent audits and purple
team exercises.

AI/ML

GOOGLE FRAMEWORK HELPS LLMS PERFORM BASIC VULNERABILITY RESEARCH

Laura FrenchJune 24, 2024

“Project Naptime” enables models like ChatGPT to perform up to 20x better than
in previous attempts.

Data Security

LEVI’S CAUGHT WITH PANTS DOWN: HACKERS EXPOSE 72,000 CUSTOMER ACCOUNT DETAILS

Shaun NicholsJune 24, 2024

Clothing company Levi Strauss said some 72,000 customer accounts have come under
attack from threat actors.


Ransomware

DEADLINE LOOMS FOR ALLEGED LOCKBIT EXTORTION OF FEDS OVER 33TB OF DATA

Steve ZurierJune 24, 2024

Ransomware group reportedly told the U.S. government that it has until tomorrow
to negotiate a deal or they will make the data public.

Critical Infrastructure Security

CONGRESS FLOATS MEASURE TO BLOCK CHINESE CHIPMAKING EQUIPMENT

Shaun NicholsJune 21, 2024

The U.S. Congress pushes measure to crack down on chipmaking equipment from
China.

Load More


EVENTS

 * 
   Cybercast
   
   KEY GRC PRIORITIES FOR THE SECOND HALF OF 2024
   
   Wed Jul 10

 * 
   Cybercast
   
   GOVERNANCE, RISK, AND COMPLIANCE: THE CISO PERSPECTIVE
   
   Thu Jul 11

 * 
   Cybercast
   
   HOW TO DEPLOY CYBER APPLICATIONS ON YOUR SECURITY DATA LAKE
   
   Wed Jul 17

 * 
   Cybercast
   
   CISO INSIGHTS: NAVIGATING THE GRC LANDSCAPE
   
   Thu Jul 18

 * 
   Virtual Conference
   
   PARTNER OR PROBLEM? SECURING THIRD-PARTY RELATIONS IN THE AGE OF SUPPLY-CHAIN
   ATTACKS
   
   Tue Jul 23

ADVERTISEMENT




--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies