Tuesday, July 30, 2024

State of Trust in AI: Join the Live Session

THE HACKER NEWS

In an era where AI is rapidly transforming industries, building trust with potential buyers and sellers has become paramount. How can AI companies demonstrate trust and ensure their security practices are robust and aligned with the highest standards?


Join Vanta on August 13 at 10 AM PST for a live fireside chat with three leading AI companies, Factory, avoMD, and Stravito, to discuss:

  • How their organizations leverage security best practices

  • Compliance with AI frameworks such as ISO 42001 and NIST AI RMF

  • Demonstrating trust in AI practices


Powered by:
GetResponse

Tuesday, July 23, 2024

eBook: The Cyber Insurance MFA Checklist

How to Comply with the Cyber Insurance MFA Checklist
THE HACKER NEWS

Cyber Insurance is Essential... But Are You REALLY Covered?


Ransomware attacks are skyrocketing, and cyber insurance requirements are getting stricter by the day. Don't get caught unprepared. Don't get caught unprepared! This eBook is your essential go-to guide to understanding MFA requirements and ensuring you're truly covered.


This eBook simplifies the process for you. Inside, you'll find:

  • Detailed explanations of the MFA types required for cyber liability insurance

  • Expert tips on evaluating cyber insurance solutions

  • Practical steps to comply with MFA requirements with minimal network disruption

  • And much more

Don't let the complexities of cyber insurance overwhelm you. Download our eBook today and ensure your organization is protected and compliant.


Powered by:
GetResponse

Monday, July 22, 2024

Biggest IT Outage in History — Cyber Glitch That Paralyzes the World

It started like any other Friday morning, but quickly turned into a tech disaster. A faulty update from CrowdStrike, a leading cybersecurity firm, unleashed chaos across the globe, grounding flights, crashing computers, and causing widespread disruptions.

The Culprit

CrowdStrike's CEO George Kurtz identified the root cause: a defective content update for Windows. This glitch caused computers to crash and display the infamous blue screen of death. The affected systems couldn't reboot, leaving organizations around the world in disarray.

The Fallout

Industries affected:

  • Airlines: Major U.S. airlines like United, American, and Delta grounded flights, leading to significant travel delays.

  • Emergency Services: 911 services in Alaska and New Hampshire went down, though they were later restored.

  • Media: Sky News was unable to broadcast.

  • Transportation: Train services in the U.K. and boarding scanners at Edinburgh airport were disrupted.

  • Cloud Services: Google Cloud and Microsoft Azure faced issues with Windows virtual machines crashing.

The Fix

CrowdStrike provided a workaround:

  1. Boot Windows into Safe Mode or Windows Recovery Environment.

  2. Navigate to C:\Windows\System32\drivers\CrowdStrike.

  3. Delete the file named "C-00000291*.sys".

  4. Restart the computer normally.

This manual fix, while effective, is time-consuming and labor-intensive for large organizations.

The Bigger Picture

The incident reveals the fragility of monocultural supply chains. Omkhar Arasaratnam from OpenSSF pointed out that gradual rollouts and diverse technology stacks could prevent such widespread disruptions in the future.


The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of malicious actors exploiting the situation with phishing attacks and scam websites. Organizations are urged to bolster their cybersecurity measures to fend off these threats.

Moving Forward

CrowdStrike is working diligently to communicate the fix and support affected customers. However, the road to full recovery is long, with manual interventions required on a large scale. The incident serves as a stark reminder of the critical importance of robust update and patch management systems in our interconnected world.


Powered by:
GetResponse

Tuesday, July 16, 2024

Want the Best Board Meeting of Your Career? Download the CISO's Guide

Don't miss out on the ultimate guide every CISO needs to read.
THE HACKER NEWS

Are you prepared to navigate the ever-evolving landscape of cybersecurity threats?


Our new CISO's Guide is your ultimate roadmap to becoming a proactive and effective CISO. Don't miss out on the opportunity to elevate your cybersecurity leadership skills and protect your organization from emerging threats.


You'll learn how to:

  • Adopt a CTEM-based approach to Risk Reporting 

  • Provide quantifiable risk insights 

  • Answer the Board's most critical questions accurately and with confidence

Click the link below and take the first step towards becoming the cybersecurity leader your organization needs.


Powered by:
GetResponse

Wednesday, July 10, 2024

Cutting-Edge Cyber Protection for Modern Day Threats

THE HACKER NEWS

Traditional cyber solutions have served us well, but the landscape of cyber threats is changing rapidly. Content Disarm & Reconstruction is designed to tackle these emerging challenges head-on, ensuring your data remains secure without compromising performance.


What you'll discover:

  • Future-Proofing your Organization 

  • Advanced Threat Protection 

  • Innovative Technology 

Compare conventual methods vs advanced CDR solutions and find out how you can deliver unmatched security for your organization.


Powered by:
GetResponse

Tuesday, July 2, 2024

A Comprehensive Guide to DORA Readiness for Financial Services

THE HACKER NEWS

A down-to-earth, honest exploration of how to meet the compliance regulations of the EU's Digital Operational Resilience Act (DORA). If you are doing business in the EU, this regulation may affect your business more than you think.


DORA comes into effect on January 17, 2025. MazeBolt's eBook, A Comprehensive Guide to DORA Readiness for Financial Services, explores the importance of DDoS vulnerability testing and outlines what your organization needs to do now, in order to be compliant with DORA. 


Gain insight into the 5 pillars of DORA:

  1. Digital operational resilience testing

  2. ICT risk management

  3. ICT incident reporting

  4. Information and intelligence sharing

  5. ICT Third-Party Risks

Learn more about DORA.


Powered by:
GetResponse