الشرطة والجريمة

تفوق الجرائم الإلكترونية على الجرائم الجسدية ؛ استخدام البيانات الضخمة ضد الجريمة المنظمة ؛ إصلاح الشرطة الواعي - تغطي هذه الصفحة الاتجاهات والأخبار التي ستوجه مستقبل الشرطة والجريمة.

الفئة
الفئة
الفئة
الفئة
التوقعات الشائعةجديدالفرز
251245
إشارات
https://www.neowin.net/sponsored/download-cybersecurity-and-decision-makers-data-security--142-value--free/
إشارات
Neowin
Claim your complimentary eBook worth $142 for free, before the offer ends . Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities.
250648
إشارات
https://www.helpnetsecurity.com/2024/04/15/cybersecurity-books-video/
إشارات
Helpnetsecurity. الأمن
In this Help Net Security video round-up, authors discuss their cybersecurity books and provide an inside look at each title.
Complete videos

George Finney, CSO at Southern Methodist University, talks about his book - "Project Zero Trust: A Story about a Strategy for Aligning Security and the...
250647
إشارات
https://federalnewsnetwork.com/cybersecurity/2024/04/a-look-into-whether-one-hhs-component-is-properly-securing-its-cloud-information-systems/
إشارات
شبكة الأخبار الفيدرالية
A new audit looks at how one agency within the Department of Health and Human Services (HHS) manages its cloud computing assets. The HHS inspector general looked specifically at the Administration for Children and Families. To learn more, Federal News Network's Eric White spoke to the Assistant Inspector General for Cybersecurity and IT audits, Tamara Lilly on the Federal Drive with Tom Temin.
249800
إشارات
https://www.jdsupra.com/legalnews/the-true-cost-of-cybersecurity-failure-5151924/
إشارات
جدسوبرا
Picture this: your company's systems are frozen, your data is held hostage and panicked customers flood your phone lines. A simple mistake, an unpatched vulnerability - even when your team was doing all the right things. It wasn't supposed to happen to you. But cybersecurity breaches can strike anyone, leaving financial ruin, legal battles and lasting reputational damage in their wake.
249799
إشارات
https://www.jdsupra.com/legalnews/privacy-data-and-cybersecurity-quick-3723704/
إشارات
جدسوبرا
Katten's Privacy, Data and Cybersecurity Quick Clicks is a monthly newsletter highlighting the latest news and legal developments involving privacy, data and cybersecurity issues across the globe. To read more issues of Katten's Privacy, Data and Cybersecurity Quick Clicks, please click here. On March 22, the Cybersecurity Administration of China (CAC) issued the long-awaited new Regulations on Promoting and Regulating Cross-Border Data Flows, effective immediately, for compliance with China's Personal Information Protection Law, the Data Security Law and their implementing regulations.
249798
إشارات
https://www.securitymagazine.com/articles/100591-the-cat-and-mouse-ransomware-game-may-threaten-smaller-organizations
إشارات
مجلة الأمن
The practice of cybersecurity is ever-changing, marked by a continual dance between the attackers and the defenders. Each side is in a constant state of adaptation, reacting to the strategies of the other. The ongoing evolution of ransomware cybercrime is a prime illustration of this dynamic. Historically, ransomware attacks were somewhat isolated events.
249797
إشارات
https://www.forbes.com/sites/forbestechcouncil/2024/04/18/why-you-still-shouldnt-trust-zero-trust/
إشارات
الشرق الأوسط
Camellia Chan is the CEO and Cofounder of Flexxon, a next-generation hardware cybersecurity solutions provider with a global presence.
جيتي
Zero-trust security has recently suffered the same fate as many tech buzzwords—it's overused, poorly understood and diluted in actual performance. Then,...
249796
إشارات
https://www.tripwire.com/state-of-security/supply-chain-cybersecurity-importance-everyone
إشارات
الشرارة
I'm always surprised - and a little disappointed - at how far we have to go before supply chain cybersecurity gets the respect and attention it deserves.
I sat down this week with a new client who wanted some help addressing several internal issues surrounding their IT systems. When I asked them...
249795
إشارات
https://www.itsecurityguru.org/2024/04/18/goldilock-partners-with-organisation-behind-natos-largest-cyber-defence-exercise/
إشارات
com.itsecurityguru
Goldilock, the British cybersecurity startup behind a unique physical network isolation solution, has partnered with CR14, a cyber defence organisation established by the Estonian ministry of defence and host of NATO's operative Cyber Defence Centre of Excellence (CCDCOE), to conduct testing activities with the aim of increasing the resilience of critical national infrastructure (CNI).
248881
إشارات
https://www.mondaq.com/Article/1447422
إشارات
[موندق]
Thailand's Cybersecurity Regulating Committee (CRC) released a notification under the Cybersecurity Act on February 22, 2024, setting key operational obligations for critical information infrastructure (CII) organizations. The notification takes effect on June 20, 2024. CII organizations are state or private entities that carry out services related to national security, public services, banking and finance, information technology and telecommunications, transportation and logistics, energy and public utilities, or public health.
248880
إشارات
https://www.scmagazine.com/perspective/how-ai-powered-iam-can-bolster-security
إشارات
مجلة سكاماجازين
لقد أدى التقاطع بين الذكاء الاصطناعي (AI) وإدارة الهوية والوصول (IAM) إلى إعادة تشكيل كيفية تعامل المؤسسات مع الأمن السيبراني والمصادقة على البشر والآلات. من خلال الاستفادة من الذكاء الاصطناعي داخل IAM، يمكن للشركات تعزيز التدابير الأمنية، خاصة فيما يتعلق بمخاطر البيانات، وتحسين تجارب المستخدم، والاستجابة بشكل استباقي للتهديدات الديناميكية.
248879
إشارات
https://www.cnn.com/2024/04/17/politics/russia-hacking-group-suspected-texas-water-cyberattack/index.html
إشارات
CNN
سي ان ان
-


A hacking group with ties to the Russian government is suspected of carrying out a cyberattack in January that caused a tank at a Texas water facility to overflow, experts from US cybersecurity firm Mandiant said Wednesday.


The hack in the small town of Muleshoe, in north Texas,...
248878
إشارات
https://www.kuppingercole.com/events/identity-first-security
إشارات
كوبينجيركول
Gain insights into gaps within Zero Trust deployments. Understand synergies between ITDR and Zero Trust, fortifying security frameworks. Learn critical considerations for ITDR implementation, including risk mitigation strategies. Manage exceptions and sophisticated social engineering attacks. Gain insights into navigating data privacy concerns and Shadow SaaS challenges. See also.
248877
إشارات
https://www.finsmes.com/2024/04/miggo-security-interview-with-ceo-daniel-shechter.html
إشارات
فينسمس
Miggo Security, a Tel Aviv, Israel-based cybersecurity startup introducing an Application Detection and Response (ADR) platform, just announced the raise of $7.5m in seed funding. In conjunction with the funding, Daniel Shechter, CEO and co-founder of the company replied to our questions about...
248876
إشارات
https://cfotech.co.nz/story/most-enterprise-pcs-ill-equipped-for-ai-induced-security-threats
إشارات
كفوتيك
A staggering 92% of enterprise PCs are ill-prepared to deal with the emerging security challenges ushered in by the AI revolution, warned a report by Absolute Security, a leading professional services provider in the realm of cybersecurity.
The warning came as part of the recent Absolute Security...
248875
إشارات
https://allafrica.com/stories/202404170205.html
إشارات
الأفريكا
وسط النمو السريع للاتصالات الإلكترونية والتجارة الإلكترونية، أكد أصحاب المصلحة على الحاجة الملحة لتحسين معايير أمن البريد، وتدابير الأمن السيبراني، وبروتوكولات تبادل البيانات الإلزامية. ظهرت هذه الدعوة للعمل خلال ورشة العمل القطاعية حول أمن سلسلة التوريد والتبادل الإلكتروني المتقدم (EAD) التي عقدتها لجنة الاتصالات الأوغندية (UCC).
248874
إشارات
https://www.helpnetsecurity.com/2024/04/17/armis-acquires-silk-security-for-150-million/
إشارات
Helpnetsecurity. الأمن
جدران الحماية بالو ألتو: عمليات الاستغلال العامة، والهجمات المتزايدة، والتخفيف غير الفعال التهديدات.
247977
إشارات
https://www.helpnetsecurity.com/2024/04/16/guidepoint-security-iot-security-assessment/
إشارات
Helpnetsecurity. الأمن
يمكن استغلال ثغرة PuTTY لاستعادة المفاتيح الخاصة (CVE-2024-31497) تم اختراق موفر Cisco Duo، وتعرض سجلات SMS MFA للاختراق، وتم اكتشاف هجمات جديدة مفتوحة المصدر للاستيلاء على المشروع، مما أدى إلى إحباط 5 موارد فرق حمراء مجانية لتبدأ، تم إعداد الذكاء الاصطناعي لتعزيز أدوار الأمن السيبراني ، وليس استبدالها.
247978
إشارات
https://www.itsecurityguru.org/2024/04/16/pentest-people-becomes-the-first-leeds-based-cybersecurity-company-to-achieve-ncscs-cyber-advisor-cyber-essentials-accreditation/
إشارات
com.itsecurityguru
تعلن شركة اختبار الاختراق كخدمة (PTaaS®) وخبراء الأمن السيبراني اليوم أنها أول شركة للأمن السيبراني مقرها ليدز تصبح مستشارًا إلكترونيًا مؤهلًا ومعتمدًا (Cyber ​​Essentials) في مخطط Cyber ​​Advisor الخاص بـ NCSC. تم تطوير هذا البرنامج بالشراكة مع IASME، وهو يبسط العملية للمؤسسات التي تشرع في رحلة الأمن السيبراني الخاصة بها، مما يضمن قدرتها على الوصول بسهولة إلى الخبرة والإرشادات المقدمة من المتخصصين المعتمدين.
247979
إشارات
https://latesthackingnews.com/2024/04/16/personal-data-exposed-in-massive-global-hack-understanding-the-implications-guarding-privacy-axios-security-group/
إشارات
آخر أخبار القرصنة
37 وفي العصر الرقمي حيث المعلومات هي العملة الجديدة، سلط الاختراق العالمي الأخير الضوء مرة أخرى على الحاجة الملحة إلى تعزيز تدابير الأمن السيبراني. تم التعرف على الاختراق على أنه Midnight Blizzard، من جهة فاعلة ترعاها الدولة الروسية والمعروفة باسم NOBELIUM. وأثرت على ملايين...
247980
إشارات
https://www.itworldcanada.com/article/us-government-faces-criticism-over-microsoft-security-failures-hashtag-trending-tuesday-april-16-2024/560467
إشارات
Itworldcanada
Solar power is the largest source of new US electricity generation for the sixth month in a row, Microsoft is hiking prices on Dynamics 365 business apps by up to 16.7%, VMware's Desktop Virtualization products rebranded as "Omnissa", Tesla is laying off over 10% of global workforce amid delivery slump and the U.government gets some scathing criticism over Microsoft's cybersecurity failures.
247982
إشارات
https://www.thefastmode.com/technology-solutions/35644-accelerating-investigation-threat-defense-and-risk-control-with-real-time-network-visibility
إشارات
الوضع السريع
In a recent interview, Ariana Lynn, Principal Analyst at The Fast Mode spoke to Daniel Chu, Vice President of Systems Engineering for APJ at ExtraHop on the impact of traffic visibility on modern IP networks. Daniel joins us in a series of discussions with leading networking, analytics and cybersecurity companies, assessing the need for traffic filtering technologies that can deliver real-time, granular application awareness.