Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Endpoint Security and Network Monitoring News for the Week of December 23; Zscaler, NCC Group, CISA, and More

admin by admin
Dec 23, 2022
in Cyber Intelligence
A A
0

The editors at Solutions Review have curated this list of the most noteworthy endpoint security and network monitoring news for the week of December 23. This curated list features endpoint security and network monitoring vendors such as Zscaler, NCC Group, CISA, and more.

Keeping tabs on all the most relevant endpoint security and network monitoring news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last month in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy endpoint security and network monitoring news items.

Download Link to Data Integration Buyers Guide

Endpoint Security and Network Monitoring News for the Week of December 23


Zscaler Joins JCDC to Enhance Collective Cybersecurity Posture of U.S.

Zscaler, a cloud security solutions provider, announced its membership in the Joint Cyber Defense Collaborative (JCDC), underscoring the company’s commitment to improving the nation’s cyber resiliency. JCDC, established by the Cybersecurity and Infrastructure Security Agency (CISA) in 2021, leads the development and implementation of joint cyber defense plans and operations through critical partnerships with the private sector, Federal government and state, local, tribal and territorial governments. Zscaler will work with JCDC to enhance the collective cybersecurity posture of the United States and strategic international partners.

Read on for more.

NCC Group Releases Monthly Threat Pulse Report

Analysis from NCC Group’s Global Threat Intelligence team has revealed a 41 percent increase in ransomware attacks this month as returning threat actor groups resurface. The 41 percent rise from 188 incidents to 265 makes November the most active month for ransomware attacks since April this year. Across the regions, North America suffered 151 ransomware attacks (45 percent), making it the most targeted region, ahead of Europe which experienced 65 (25 percent). Asia remained the third most targeted with 14 percent of attacks.

Read on for more.

Hacked Ring Cams Used to Record Swatting Victims

Two U.S. men have been charged with hacking into the Ring home security cameras of a dozen random people and then “swatting” them— falsely reporting a violent incident at the target’s address to trick local police into responding with force. Prosecutors say the duo used the compromised Ring devices to stream live video footage on social media of police raiding their targets’ homes, and to taunt authorities when they arrived.

Read on for more.

BackBox Named in ‘ASTORS’ Homeland Security Awards

BackBox, a network automation platform, announced it was named Best Network Automation Solution in the Centralized Multi Vendor Network Automation category of the 2022 ‘ASTORS’ Homeland Security Awards. The ‘ASTORS’ are awarded by American Security Today. American Security Today’s Annual ‘ASTORS’ Awards is the preeminent U.S. Homeland Security Awards Program. The awards recognize industry leaders in physical and border security, cybersecurity, emergency preparedness, as well as federal, state, and municipal government agencies in acknowledgment of their outstanding security efforts.

Read on for more.

LogRhythm Partners with SentinelOne

LogRhythm, a cybersecurity solutions provider, announced its partnership with SentinelOne, an autonomous cybersecurity platform company. Together, LogRhythm and SentinelOne provide an integrated enterprise security solution to prevent, detect, and respond to threats in your environment. The combined solution streamlines security operations and improves response workflow, helping overwhelmed security teams cut through the noise and gain precise insights into cybersecurity threats.

Read on for more.

CISA Researchers: “Russia’s Fancy Bear Infiltrated US Satellite Network”

Researchers at the Cybersecurity and Infrastructure Security Agency (CISA) recently discovered suspected Russian hackers lurking inside a U.S. satellite network, raising fresh concerns about Moscow’s intentions to infiltrate and disrupt the rapidly expanding space economy. While details of the attack are scant, researchers blamed the incident on the Russian military group known as Fancy Bear, or APT28. It involved a satellite communications provider with customers in U.S. critical infrastructure sectors.

Read on for more.


Download Link to Data Integration Buyers Guide

Mike Costello

Mike Costello is the Content Editor for Cybersecurity at Solutions Review. His work covers Endpoint Security, Identity Management, and SIEM. He is a professionally trained writer and storyteller with a solid foundation in working in many platforms— including print, web, and video. Adaptable, he consistently finds the right voice on various topics and delivers stories that grab your attention. You can reach him at mcostello at solutionsreview dot com.

Mike Costello
Latest posts by Mike Costello (see all)

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.