Office 365 Flaw Made Fake Microsoft Emails Look Legitimate

A flaw in Office 365 could have been exploited by attackers to send out malicious emails and make them look as if they were coming from a legitimate microsoft.com address. The issue was discovered by Utku Sen, a Turkey-based security enthusiast known for releasing an open source ransomware called Hidden Tear for educational purposes.

Best small to midsized cities to land a cybersecurity job

While cybersecurity positions are plentiful in most major cities, thousands of cyber positions at all levels are waiting to be filled in less populated and often more scenic locales – and most offer a lower cost of living. Although larger corporations usually post the most job openings, “you’re most likely to find that you’re working…

Symantec acquisition has lawsuit-filled past

LifeLock, the identity protection vendor that Symantec today said it would acquire for $2.3 billion, has been the frequent target of lawsuits filed by customers, state attorneys general and the Federal Trade Commission (FTC). Less than a year ago, LifeLock paid $100 million to settle a contempt complaint brought by the FTC. That complaint originated…

Cloud Governance Fails Could Trigger Privacy Compliance Issues: Report

On average, an enterprise now uses 1,427 cloud services. Seventy-one percent of these are enterprise services, with the remainder being consumer services. The average employee actively uses 36 cloud services, including nine collaboration services, six file sharing services, and five content sharing services (such as YouTube). These figures come from an analysis of 30 million…

How security collaboration will prove vital in 2017

The escalation of high-profile hacking and data dumps recently has underscored the increasing boldness of digital threat actors, culminating in July’s Democratic National Committee email leak and its ripple effect through American politics. The group behind the hack and its attack patterns were known, and yet the attack was not thwarted, leaving many questions as…

Protect Sensitive Files With Document Security Management

When it comes to data security, documents matter. Most organizations have invested in tools that enable them to securely manage their sensitive documents. They are struggling, however, to compel employees to use these tools consistently and correctly. Throughout the IT industry, actual document management and security practices fall seriously short. Malware-infected files frequently penetrate networks…

Do You Need a Threat Intelligence Team?

I have the great opportunity to spend time with CSOs and IT executives to understand their cybersecurity concerns and help them map out a strategy for success. An increasingly common question I’ve been hearing is, “Does my organization need a threat intelligence team?” Adding threat intelligence capabilities to your organization can be valuable, with their…

Ransomware success creates apathy towards traditional antivirus software

In the last 12 months, 48 percent of organizations across the globe have fallen victim to a ransomware campaign, with 80 percent indicating that they’ve suffered from three or more attacks, according to a global survey conducted by Vanson Bourne. In response to ransomware attacks, 67 percent of businesses globally have increased IT security spending,…