article thumbnail

Founder of spyware maker Hacking Team arrested for attempted murder: local media

TechCrunch

David Vincenzetti, who launched Hacking Team in 2003, was arrested when police showed up to his apartment after his cousin called the police, local media reported, because […] © 2023 TechCrunch. All rights reserved. For personal use only.

Spyware 317
article thumbnail

IoT Adoption in Healthcare Brings Security Opportunities

CIO

By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks Connected medical devices, also known as the Internet of Medical Things or IoMT, are revolutionizing healthcare, not only from an operational standpoint but related to patient care. Many connected devices ship with inherent vulnerabilities.

IoT 219
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The role software developers play in the cybersecurity space

Lacework

Cybersecurity is the intentional practice of securing networks, data, and devices from unauthorized users. The software development lifecycle focuses on implementing core functionality in software and applications; code quality and security is often an afterthought. Security starts and ends with us – the developers.

article thumbnail

Patch Tuesday’s Impact on Cybersecurity Over the Years

Tenable

Patch Tuesday’s Impact on Cybersecurity Over the Years Dive into the history of Patch Tuesday and learn how it continues to influence the ways security teams manage patches. Yet, these rumors led to soul searching among many IT, security and DevOps teams. Background on MS Patch Tuesday. Source: Tenable Research, December 2022.

article thumbnail

FTC Launches New Cyber Security Tools for Small Business

CTOvision

The Federal Trade Commission (FTC) has launched a resource to raise awareness about the vital role cybersecurity plays for the 32+ million small businesses in the US. This effort was part of the National Cyber Security Awareness Month (NCSAM) in October, which has been recognized every month since 2003.

article thumbnail

LMS365, a learning management system built into Microsoft 365 and Teams, raises $20M

TechCrunch

Or they can import pre-existing courses or quizzes constructed elsewhere and stored in the SCORM or AICC format , which can be useful for general industry-specific training for cybersecurity, or regulatory compliance. Holst joined LMS365 last year from secure messaging company Wire , where he previously served as chief revenue officer.

System 248
article thumbnail

From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice

Haft of the Spear

While the Ware Report of 1970 codified the foundations of the computer security discipline, it was the President’s Commission on Critical Infrastructure Protection report of 1997 that expanded those requirements into recommendations for both discrete entities as well as the nascent communities that were growing in and around the Internet.

Security 102