Geek-Guy.com

Category: Security

Auto Added by WPeMatico

The 23andMe Collapse, Signal Gate Fallout

In this episode, we discuss the urgent need to delete your DNA data from 23andMe amid concerns about the company’s potential collapse and lack of federal protections for your personal information. Kevin joins the show to give his thoughts on the Signal Gate scandal involving top government officials, emphasizing the potential risks and lack of…

White House reportedly blames auto-suggested iPhone contact for Signal scandal

How did Atlantic editor-in-chief Jeffrey Goldberg get added to a Signal group chat with Trump administration officials discussing their plans for an airstrike in Yemen? The simplest explanation: National Security Adviser Mike Waltz had Goldberg saved as a contact in his phone and accidentally added him. Indeed, when Waltz first claimed that Goldberg’s phone number…

Cloud Native Security: How to Protect Your Kubernetes Infrastructure

As organizations increasingly adopt cloud-native technologies, securing Kubernetes infrastructure has become more important than ever. Cloud-native security encompasses practices and tools designed specifically to protect applications, data, and infrastructure in today’s ephemeral, distributed cloud environments. By aligning cloud native security practices with regulatory requirements, you can better ensure compliance, which is critical for organizations operating…

North Korean Hackers Disguised as IT Workers Targeting UK, European Companies, Google Finds

The attackers pose as legitimate remote IT workers, looking to both generate revenue and access sensitive company data through employment. “Europe needs to wake up fast,” according to Google’s Jamie Collier.

How SecurityBridge Secures the SAP Ecosystem

SAP’s vast ecosystem of tech solutions has supported organizations for decades in achieving cross-functional planning and success. Securing that legacy tech stack can be challenging, which is why vendors like SecurityBridge create solutions to simplify that process. CTO and Co-Founder Ivan Mans spoke with Channel Insider about the necessity for SAP-specific security tools and what…

Threat-informed defense for operational technology: Moving from information to action

As the threat landscape continues to evolve, critical infrastructure sectors face a growing wave of sophisticated cyber threats. Traditional security strategies that focus solely on indicators of compromise (IoCs) are proving insufficient against the scale and speed of modern cyberattacks. To address today’s challenges, organizations must adopt a threat-informed defense approach—one that shifts the focus…

LogicMonitor Celebrates Early FedRAMP Milestone

LogicMonitor has become the latest vendor to announce a new categorization in the FedRAMP authorization system. The company is now labeled “In Process,” which reflects that it is actively working towards full authorization. FedRAMP progress signals growth in government business The FedRAMP authorization program is run by the Department of Homeland Security’s Cybersecurity and Infrastructure…

Sophos Releases 2025 Active Adversary Report, ID’s Top Risks

Sophos recently released the findings of its annual report detailing various learnings and insights from its internal research. The report details attacker behavior and techniques from over 400 MDR and IR cases in 2024. Research shows organizations are detecting attacks faster, but threats remain complex The report found that the primary way attackers gained initial…

The urgent reality of machine identity security in 2025

The importance of machine identity security has reached a critical juncture in 2025. With machine identities now far outnumbering human ones, securing these digital credentials has become a top cybersecurity priority for enterprises. However, as the CyberArk 2025 State of Machine Identity Security Report shows, many of the 1,200 security leaders in organizations we surveyed—across the U.S., U.K., Australia,…

How CISOs can use identity to advance zero trust

AI is the best thing that’s ever happened to cybercriminals. It allows them to weaponize trust and launch identity-based attacks with staggering scale and sophistication. I’m talking about mutating polymorphic malware, prolonged ransomware sneak attacks that lead to double-extortion and deepfakes that defraud victims every few minutes. CISOs must adapt to this reality by implementing zero…

Understanding Privacy Changes: eBay’s AI Policy and The Future of Data Privacy

In this episode, host Tom Eston discusses recent privacy changes on eBay related to AI training and the implications for user data. He highlights the hidden opt-out feature for AI data usage and questions the transparency of such policies, especially in regions without strict privacy laws like the United States. The host also explores how…

WordPress Appliance - Powered by TurnKey Linux