BayPay Members Blogs

This additional resource is sponsored by The BayPay Forum.

This New Ransomware Is Targeting NAS Devices


Facing the unique challenges of a ransomware attack Lester Godsey, chief information security officer in Mesa, AZ, discusses how ransomware attacks have changed in the past few years and how to...
Continue reading
  0 Comments
0 Comments

Brazilians Report Lack Of Cybersecurity Skills

Brazilians are increasingly aware of the importance of cybersecurity but most adults report a lack of knowledge of how to protect their lives online, according to a new report. According to...
Continue reading
  0 Comments
0 Comments

US Coast Guard Warns of Maritime Malware Attacks

US Coast Guard Warns of Maritime Malware Attacks
Cybercrime , Fraud Management & Cybercrime , Governance Incident Investigation Triggers Alert, Which Calls for Precautions( @Ferguson_Writes ) • July 9, 2019    (Image: U.S. Coast Guard) The U.S. Coast Guard...
Continue reading
  0 Comments
0 Comments

Overcoming Vulnerability Overload

Governance , IT Risk Management , Patch Management Nate Dyer of Tenable on How Predictive Prioritization Can Help( @nickster2407 ) • July 9, 2019     Nate Dyer, product marketing director,...
Continue reading
  0 Comments
0 Comments

Moving From Vulnerability Management to Vulnerability Response

Governance , IT Risk Management Syra Arif of ServiceNow on Essential Steps( @nickster2407 ) • July 9, 2019     Syra Arif, senior advisory solutions architect, security & risk, ServiceNow Shifting from...
Continue reading
  0 Comments
0 Comments

Best Practices for Device Security

Endpoint Security Steve Hyman of Ordr on the Importance of Network Visibility( @Ferguson_Writes ) • July 9, 2019     Steve Hyman, regional director, Ordr As healthcare providers connect more and more...
Continue reading
  0 Comments
0 Comments

Live Webinar: How to Achieve Continuous Compliance in Cloud Native DevOps

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of...
Continue reading
  0 Comments
0 Comments

Live Webinar | Realizing the Strategically Essential Value of Good Third-Party Cybersecurity Risk Management

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of...
Continue reading
  0 Comments
0 Comments

Threat Intelligence: Why Sharing Is Difficult

) • July 9, 2019     10 Minutes    Cyber adversaries are resilient and move quickly, so it's critical that organizations share real-time threat intelligence in an automated way, says...
Continue reading
  0 Comments
0 Comments

BianLian Banking Trojan Adds Screen Recorder

Researchers have discovered a new version of the Android banking trojan BianLian that introduces the ability to record device screens and set of proxies. Named after the Chinese art of “face-changing,”...
Continue reading
  0 Comments
0 Comments

Cyber Spies Take A Step Out Of The Shadows With History Of Codebreaking


Britain's ultra-secretive GCHQ opens up to let startups join fight against cyberattackers The secret to being a great spy agency in the 21st century: Incubating startups. Traditionally secretive government intelligence services...
Continue reading
  0 Comments
0 Comments

Marriott Faces $123 Million GDPR Fine In The UK For Last Year's Data Breach

marriottfacesmassivedatabreachexpen-5c030d7760b2dc10be2fd19c1dec032018215637poster.jpg
The UK's Information Commissioner's Office (ICO) intends to impose a fine of £99,200,396 ($123,705,870) on international hotel chain Marriott for last year's data breach. In November 2018 , Marriott disclosed that...
Continue reading
  0 Comments
0 Comments

Zoom Software Allows Video Snooping On Macs

Apple laptop
Image copyright Getty Images Image caption The flaw can be exploited by forcing Mac users to visit booby-trapped websites Hackers could access cameras on millions of Apple Macs thanks to a...
Continue reading
  0 Comments
0 Comments

Hacked Forensic Firm Pays Ransom After Malware Attack

Britain’s largest private forensics provider has paid a ransom to hackers after its IT systems were brought to a standstill by a cyber-attack, it has been reported. Eurofins, which is thought...
Continue reading
  0 Comments
0 Comments

British Airways Faces Record Fine For Data Breach

Gatwick North Terminal
image
Image copyright Getty Images British Airways is facing a record fine of £183m for last year's breach of its security systems. The airline, owned by IAG, says it is "surprised and...
Continue reading
  0 Comments
0 Comments

FBI, ICE Plunder DMV Driver Database For Facial Recognition Scans


New North Korea-linked malware strain puts FBI and DHS under alert Electricfish malware is used to forge covert pathways out of infected Windows PCs. The Federal Bureau of Investigation (FBI) and...
Continue reading
  0 Comments
0 Comments

Fieldwork Software Database Leak Exposed Credit Card Details


Leakers publish source code of Iranian hacking tools APT34 hacking tools and victim data leaked on a secretive Telegram channel since last month. Researchers have uncovered a database exposed on the...
Continue reading
  0 Comments
0 Comments

CISO Tackles the Accidental Insider Threat

Events , Governance , Insider Threat Anne-Marie Scollay of Axiom Law Focuses on the Human Factor( SecurityEditor ) • July 8, 2019     Anne-Marie Scollay, CISO, Axiom Law For years, security...
Continue reading
  0 Comments
0 Comments

CISO Notebook: Third-Party Risk

3rd Party Risk Management , Events , Governance Cris Ewell of UW Medicine on Managing Vendor Risks( SecurityEditor ) • July 8, 2019    Cris Ewell, CISO, UW Medicine Where is...
Continue reading
  0 Comments
0 Comments

On The Run In Cuba, McAfee Pushes Cryptocurrency

image
image
HAVANA (Reuters) - On the run from U.S. tax authorities, tech guru John McAfee puffs a cigar aboard his towering white yacht in a Havana harbor and says he can help...
Continue reading
  0 Comments
0 Comments