<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Computing &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/computing/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 19 Dec 2020 10:42:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Computing &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>whoswholegal &#8211; Features &#8211; Law firms as prime targets for hackers: 7 steps to reducing cyber risks</title>
		<link>https://risk-academy.ru/whoswholegal-features-law-firms-as-prime-targets-for-hackers-7-steps-to-reducing-cyber-risks/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 19 Dec 2020 10:42:09 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Law firms]]></category>
		<category><![CDATA[insurance policies]]></category>
		<category><![CDATA[Video gaming]]></category>
		<category><![CDATA[certain security tools]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/whoswholegal-features-law-firms-as-prime-targets-for-hackers-7-steps-to-reducing-cyber-risks/</guid>

					<description><![CDATA[Due to the nature of their business, law firms possess a tremendous volume of valuable documents and data, which are extremely attractive to hackers of a variety of motivations. Successful [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Due to the nature of their business, law firms possess a tremendous volume of valuable documents and data, which are extremely attractive to hackers of a variety of motivations. Successful cyber-attacks can cause a severe negative impact to a law firm’s operations and catastrophic damage to a law firm’s reputation.</p>
<p>According to the recently published 2020 <em>ABA Legal Technology Survey Report</em>, the number of law firms experiencing a known security breach increased to 29 per cent in 2020. The survey notes that “despite the ethical issues and pending challenges, the use of certain security tools remains at less than half of respondents,” and only 36 per cent of the respondents have committed to cyber insurance policies.</p>
<p>This paper seeks to help all organisations and institutions, not just law firms, better understand the threats they face and why they should work toward better cyber hygiene, and a more proactive incident and threat management strategy. First, I review why law firms are attractive cyber targets and how compromising these firms is a high priority to threat actors. I will define the concept of “cyber hygiene” and show why it is critical to maintaining IT&#8230;</p>
</div>
<p><a href="https://whoswholegal.com/features/law-firms-as-prime-targets-for-hackers-7-steps-to-reducing-cyber-risks">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A CISO’s Cybersecurity Wishlist &#8211; Security Boulevard</title>
		<link>https://risk-academy.ru/a-cisos-cybersecurity-wishlist-security-boulevard/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 20:53:09 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[internet security]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Internet security with Linux]]></category>
		<category><![CDATA[Daniel Hooper]]></category>
		<category><![CDATA[CISO Extraordinaire]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/a-cisos-cybersecurity-wishlist-security-boulevard/</guid>

					<description><![CDATA[It’s that time of the year, when anywhere you go (I mean on the internet, of course), there are wishlists galore. The toys wishlist, the kitchen wishlist, the tech gadgets [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<p>It’s that time of the year, when anywhere you go (I mean on the internet, of course), there are wishlists galore. The toys wishlist, the kitchen wishlist, the tech gadgets wishlist, the list (no pun intended) is endless. But what do security leaders and CISOs want? What would be on their cybersecurity wishlist? We polled an amazing group of CISOs and CIOs and posed this question to them.</p>
<p>Interestingly, a similar question was also recently posed by CISO Extraordinaire, Daniel Hooper on LinkedIn. He asked, <strong>“CISO friends, what’s the one thing you wish you had in your program?”</strong> and the replies he got ranged from the practical, to the esoteric, to really funny, but all were very telling.</p>
<p>Here are the top 3 wishes taken from what we heard from the CISOs we spoke with directly, combined with the comments from this LinkedIn thread:</p>
<figure id="attachment_5454" aria-describedby="caption-attachment-5454" style="width: 800px" class="wp-caption aligncenter"><img decoding="async" title="Technology Internet" loading="lazy" class="wp-image-5454" src="https://www.balbix.com/app/uploads/wishlist-item-1-1024x899.png" alt="A CISOs Cybersecurity Wishlist - Become more data driven" width="800" height="702" /><figcaption id="caption-attachment-5454" class="wp-caption-text">Wish #1 – Become more data driven</figcaption></figure>
<h2 style="text-align: left">1. Depend less on gut feelings and become more data-driven</h2>
<p>Security leaders are frustrated with their inability to accurately measure and understand their attack surface. As a result, their cybersecurity programs are based on incomplete data. They worry about unseen cyber-risks and vulnerabilities and struggle with how&#8230;</p>
</div>
<p><a href="https://securityboulevard.com/2020/12/a-cisos-cybersecurity-wishlist/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top 9 Cybersecurity Certifications (2020)</title>
		<link>https://risk-academy.ru/top-9-cybersecurity-certifications-2020/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 10 Dec 2020 19:38:27 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Operating systems]]></category>
		<category><![CDATA[Illinois Institute of Technology]]></category>
		<category><![CDATA[real-time scenarios]]></category>
		<category><![CDATA[hacking technologies]]></category>
		<category><![CDATA[cloud computing technology]]></category>
		<category><![CDATA[important tool]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/top-9-cybersecurity-certifications-2020/</guid>

					<description><![CDATA[Cybersecurity is becoming increasingly crucial for businesses in every sector, and it is especially vital for small- to medium-sized organizations. Cyberattacks continue to become a major problem in the United [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="mvp-content-main">
<p>Cybersecurity is becoming increasingly crucial for businesses in every sector, and it is especially vital for small- to medium-sized organizations. Cyberattacks continue to become a major problem in the United States and the rest of the globe, often times resulting in customer information being stolen.</p>
<p>Because of this increased risk, cybersecurity certifications are an important tool to prepare against the attacks. The high demand for cybersecurity skills means a top cybersecurity certification will boost one’s resumé.</p>
<p>With so many cybersecurity certifications to choose from, let’s take a look at the top ones on the market:</p>
<p>The Certified Ethical Hacker (CEH) course was developed in order to get you thinking like a hacker, which is crucial to stop one.</p>
<p>The class covers various topics and tools such as hacking technologies that are used against cloud computing technology, mobile platforms and operating systems. It also covers the latest malware and viruses, as well as information security laws and standards.</p>
<p>One of the fundamental aspects of the course is real-time scenarios, where you are exposed to various ways in which hackers breach networks and steal information. You will&#8230;</p>
</div>
<p><a href="https://www.unite.ai/top-cybersecurity-certifications/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality</title>
		<link>https://risk-academy.ru/key-ot-cybersecurity-challenges-availability-integrity-and-confidentiality/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 11:22:06 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Operational Technology]]></category>
		<category><![CDATA[Berliner Wasserbetriebe]]></category>
		<category><![CDATA[Berlin]]></category>
		<category><![CDATA[waste water management]]></category>
		<category><![CDATA[Computer security]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/key-ot-cybersecurity-challenges-availability-integrity-and-confidentiality/</guid>

					<description><![CDATA[Organisations are still underestimating the risks created by insufficiently secured operational technology (OT). One current example comes from Germany. According to a report by heise.de, external security testers consider it [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<p>Organisations are still underestimating the risks created by insufficiently secured operational technology (OT).</p>
<p>One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that a successful serious cyberattack against the publicly owned water company Berliner Wasserbetriebe could lead to a complete failure of the German capital’s waste water management.</p>
<p>The good news, at least for Germany, is that a combination of engineering standards and legal requirements often prevents many worst-case scenarios from happening. One such regulation requires that utility companies must be able to control their grids manually, if necessary. This is not the case in all European countries. If the legally required basic IT protections are in place, and two-factor authentication and other best practices are used, many potentially damaging incidents can be prevented or at least contained. Germany has a number of guidelines and standards that aim to minimise cybersecurity risks, including a law on basic IT security, ISO 27001, IEC62443 standards and a compendium published by the BSI, Germany’s equivalent to the UK’s National&#8230;</p>
</div>
<p><a href="https://www.tripwire.com/state-of-security/security-data-protection/key-ot-cybersecurity-challenges-availability-integrity-confidentiality/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>HackerOne making its debut in AWS Marketplace</title>
		<link>https://risk-academy.ru/hackerone-making-its-debut-in-aws-marketplace/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 01:19:03 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[AMAZON WEB SERVICES]]></category>
		<category><![CDATA[purchase services]]></category>
		<category><![CDATA[HackerOne]]></category>
		<category><![CDATA[cloud need robust security solutions]]></category>
		<category><![CDATA[Marketplace, a curated digital catalog of software]]></category>
		<category><![CDATA[Marketplace]]></category>
		<category><![CDATA[purchase software]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/hackerone-making-its-debut-in-aws-marketplace/</guid>

					<description><![CDATA[HackerOne announced that it is making its debut in AWS Marketplace. Amazon Web Services (AWS) customers can now find and purchase services from HackerOne in AWS Marketplace, a curated digital [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="entryContent">
<p>HackerOne announced that it is making its debut in AWS Marketplace. Amazon Web Services (AWS) customers can now find and purchase services from HackerOne in AWS Marketplace, a curated digital catalog of software, data, and services that run on AWS. </p>
<p>HackerOne is one of the first comprehensive security solutions providers to quote and contract services in AWS Marketplace.</p>
<p>Cloud-native organizations and those migrating to the cloud need robust security solutions to ensure their cloud development reduces security risk and identify and remediate new security vulnerabilities before they can be exploited. </p>
<p>When operating in the cloud, organizations face new cyber risks, and they need a way to know where these holes are to fix them quickly. HackerOne programs are designed to aid vulnerability discovery and management on AWS. </p>
<p>AWS customers can rely on HackerOne solutions and services to discover security risks, vulnerabilities, and misconfigurations faster and remediate priority issues with the right skills and the right team. With services from HackerOne available in AWS Marketplace, customers have a simplified way to purchase software and related services in a centralized&#8230;</p>
</div>
<p><a href="https://www.helpnetsecurity.com/2020/12/07/hackerone-aws-marketplace/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top 10 Cybersecurity Companies (2020)</title>
		<link>https://risk-academy.ru/top-10-cybersecurity-companies-2020/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 02 Dec 2020 20:59:36 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Business Finance]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[optiv]]></category>
		<category><![CDATA[Webroot]]></category>
		<category><![CDATA[OpenText]]></category>
		<category><![CDATA[Terry Cutler]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/top-10-cybersecurity-companies-2020/</guid>

					<description><![CDATA[Following our “Top 10 Cybersecurity Tips for Small Businesses,” it’s necessary to look at the top cyber security companies, which are crucial for helping businesses avoid cyber-attacks. Cyber security is [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="mvp-content-main">
<p>Following our “Top 10 Cybersecurity Tips for Small Businesses,” it’s necessary to look at the top cyber security companies, which are crucial for helping businesses avoid cyber-attacks. Cyber security is all-encompassing, covering various methods of protection for software, data, networks, devices, and more. The focus of cyber-attacks is often to target and collect unauthorized data, which is then used for a variety of different things, including ransom and to obtain financial and personal details.</p>
<p>Cyber-attacks can include fraudulent emails, social engineering, malware, ransomware, and other tools. This is why it is vital, especially for smaller-sized organizations, to seek out cybersecurity companies to help them protect this data and their systems, as any breach could be devastating for the business. Besides crucial business data, cybersecurity also prevents sites from going down, protects customer interactions and data, improves productivity, and boosts customer confidence.</p>
<p>Here is a look at the top 10 cyber security companies:</p>
<h2><strong>1. Webroot</strong></h2>
<p>Webroot, an OpenText company, was the first to harness the cloud and use AI to stop zero-day threats in real time. Webroot secures&#8230;</p>
</div>
<p><a href="https://www.unite.ai/top-10-cybersecurity-companies/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tenable Expands Support for Latest ServiceNow Platform Release to Enhance Risk-Based Vulnerability Management in Security Workflows Nasdaq:TENB</title>
		<link>https://risk-academy.ru/tenable-expands-support-for-latest-servicenow-platform-release-to-enhance-risk-based-vulnerability-management-in-security-workflows-nasdaqtenb/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 01 Dec 2020 14:53:12 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Maryland]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Tenable, Inc.]]></category>
		<category><![CDATA[COLUMBIA]]></category>
		<category><![CDATA[cloud applications]]></category>
		<category><![CDATA[PARIS]]></category>
		<category><![CDATA[ServiceNow]]></category>
		<category><![CDATA[Computer companies]]></category>
		<category><![CDATA[predictive technologies]]></category>
		<category><![CDATA[Enhance Risk]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/tenable-expands-support-for-latest-servicenow-platform-release-to-enhance-risk-based-vulnerability-management-in-security-workflows-nasdaqtenb/</guid>

					<description><![CDATA[Integration standardizes asset creation and matching for optimal data quality to identify and address vulnerable assets COLUMBIA, Md., Dec. 01, 2020 (GLOBE NEWSWIRE) &#8212; Tenable®, Inc., the Cyber Exposure company, [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<p align="center"><em>Integration standardizes asset creation and matching for optimal data quality to identify and address vulnerable assets</em></p>
<p><strong>COLUMBIA, Md., Dec. 01, 2020 (GLOBE NEWSWIRE) &#8212; </strong><u>Tenable®, Inc.</u>, the Cyber Exposure company, today announced its support of the ServiceNow Now Platform Paris release, through the Tenable Apps 3.0 integration with Vulnerability Response (VR) and ITSM workflows. The integration streamlines assessment and remediation workflows in risk-based vulnerability management programs, saving customers valuable time and resources in identifying, prioritizing and remediating high-risk vulnerabilities.</p>
<p>Tenable and ServiceNow predictive technologies enable IT and security teams to effectively identify and remediate security issues based on vulnerability and asset criticality. Customers can leverage Tenable’s Vulnerability Priority Ratings (VPR) directly within the ServiceNow Vulnerability Response application to view, sort and filter the remediation priority of each flaw based on the risk it poses to the business. Tenable Lumin<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> customers can combine this with the Asset Criticality Rating (ACR) to understand the business criticality of the impacted asset. Once&#8230;</p>
</div>
<p><a href="https://www.globenewswire.com/news-release/2020/12/01/2137550/0/en/Tenable-Expands-Support-for-Latest-ServiceNow-Platform-Release-to-Enhance-Risk-Based-Vulnerability-Management-in-Security-Workflows.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Top 20 Cybersecurity Startups To Watch In 2021 Based On Crunchbase</title>
		<link>https://risk-academy.ru/the-top-20-cybersecurity-startups-to-watch-in-2021-based-on-crunchbase/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 29 Nov 2020 17:42:31 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[information technology]]></category>
		<category><![CDATA[Databases]]></category>
		<category><![CDATA[crunchbase]]></category>
		<category><![CDATA[privacy technologies]]></category>
		<category><![CDATA[AOL]]></category>
		<category><![CDATA[Pinterest]]></category>
		<category><![CDATA[Shlomo Kramer]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/the-top-20-cybersecurity-startups-to-watch-in-2021-based-on-crunchbase/</guid>

					<description><![CDATA[getty Cybersecurity, privacy and security startups have raised $10.7 billion so far this year, five times more than was raised throughout 2010 ($1.7 billion), according to a Crunchbase Pro query [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<figure class="embed-base image-embed embed-0" role="presentation">
<div>
 <img decoding="async" title="Computing" src="https://specials-images.forbesimg.com/imageserve/5fc32cdc8798e5c2df636d3b/960x0.jpg?cropX1=320&amp;cropX2=6720&amp;cropY1=0&amp;cropY2=4480" alt="The Top 20 Cybersecurity Startups To Watch In 2021 Based on Crunchbase" data-height="4480" data-width="6720" />
 </div><figcaption>
<p class="color-body light-text"><small>getty</small></p>
</figcaption></figure>
<ul>
<li>Cybersecurity, privacy and security startups have raised $10.7 billion so far this year, five times more than was raised throughout 2010 ($1.7 billion), according to a Crunchbase Pro query today.</li>
<li>22,156 startups who either compete in or rely on cybersecurity, security and privacy technologies and solutions as a core part of their business models today, 1.450 of which have received pre-seed or seed funding in the last twelve months based on a Crunchbase Pro query</li>
<li>From network and data security to I.T. governance, risk measurement and policy compliance, cybersecurity is a growing industry estimated to be worth over $300B by 2025, according to C.B. Insight&#8217;s Emerging Trends Cybersecurity Report. </li>
</ul>
<p>Today, 797 cybersecurity, privacy and security startups have received a total of $10.73 billion so far this year, with $4.6 million being the median funding round and $17.5 million the average funding round for a startup. The number of startups receiving funding this year, funding amounts and the methodology to find the top 25 cybersecurity startups are all based on Crunchbase Pro analysis done today.  </p>
<p>New startups and established vendors are&#8230;</p>
</div>
<p><a href="https://www.forbes.com/sites/louiscolumbus/2020/11/29/the-top-20-cybersecurity-startups-to-watch-in-2021-based-on-crunchbase/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Week in review: Drupal-based sites open to attack, cPanel 2FA bypass vulnerability</title>
		<link>https://risk-academy.ru/week-in-review-drupal-based-sites-open-to-attack-cpanel-2fa-bypass-vulnerability/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 29 Nov 2020 12:41:25 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Web development]]></category>
		<category><![CDATA[CPanel]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[VMWare]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Drupal]]></category>
		<category><![CDATA[software suite]]></category>
		<category><![CDATA[2021-00-00]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/week-in-review-drupal-based-sites-open-to-attack-cpanel-2fa-bypass-vulnerability/</guid>

					<description><![CDATA[Here’s an overview of some of last week’s most interesting news and articles: Challenges organizations face in combating third-party cyber riskA CyberGRX report reveals trends and challenges organizations of all [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="entryContent">
<p>Here’s an overview of some of last week’s most interesting news and articles:</p>
<p><strong>Challenges organizations face in combating third-party cyber risk</strong><br />A CyberGRX report reveals trends and challenges organizations of all sizes face in combating third-party cyber risk today. Each insight was gleaned from proprietary assessment data gathered from a sample of 4,000 third parties.</p>
<p><strong>cPanel 2FA bypass vulnerability can be exploited through brute force</strong><br />A two-factor authentication (2FA) bypass vulnerability affecting the popular cPanel &amp; WHM software suite may allow attackers to access secured accounts, Digital Defense researchers have found.</p>
<p><strong>Automation to shape cybersecurity activities in 2021</strong><br />Automation will play a major role in shaping cybersecurity attack and defence activities in 2021, WatchGuard predicts.</p>
<p><strong>How the pandemic has accelerated existing risk trends</strong><br />COVID-19 has reorganized the risk landscape for chief audit executives (CAEs), as CAEs have listed IT governance as the top risk for 2021, according to Gartner. Analysts said the pandemic is giving rise to new sets of risks while exacerbating long-standing vulnerabilities.</p>
<p><strong>VMware releases workarounds for another critical flaw&#8230;</strong></p>
</div>
<p><a href="https://www.helpnetsecurity.com/2020/11/29/week-in-review-drupal-based-sites-open-to-attack-cpanel-2fa-bypass-vulnerability/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Securing the &#8216;next normal&#8217; through improved cybersecurity (Includes interview)</title>
		<link>https://risk-academy.ru/securing-the-next-normal-through-improved-cybersecurity-includes-interview/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 29 Nov 2020 02:38:44 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Certified Information Security Auditor]]></category>
		<category><![CDATA[ceo]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cryptography]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Detox Technologies]]></category>
		<category><![CDATA[Shitesh Sachan]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/securing-the-next-normal-through-improved-cybersecurity-includes-interview/</guid>

					<description><![CDATA[To gain an insight as to the suitable cybersecurity priorities, Digital Journal conducted an interview with Shitesh Sachan, CEO of Detox Technologies. Shitesh Sachan is a white hat hacker and [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>To gain an insight as to the suitable cybersecurity priorities, Digital Journal conducted an interview with Shitesh Sachan, CEO of Detox Technologies. Shitesh Sachan is a white hat hacker and a Certified Information Security Auditor (CISA) with over 20 years’ experience. </p>
<p><strong>Digital Journal: Since the COVID-19 Pandemic began and teams have become more dispersed, cybersecurity and privacy has become a priority for many businesses. But what steps should they be taking to protect ourselves? </strong></p>
<p><strong>Shitesh Sachan:</strong> At the outset of the global COVID-19 pandemic, many organisations decided to enforce social distancing by encouraging their employees to work from home. This decision created new security challenges for many organizations, who now had larger remote workforces. As people have started to work remotely, businesses are, quite rightly, concerned about their data privacy. Social engineering attacks and ransomware attacks have become 4 times more common during lockdown. Most of those attacks are a result of a lack of cybersecurity awareness and in-competent or incomplete security policies. There are five key steps all businesses should take to protect themselves. These&#8230;</em></div>
<p><a href="http://www.digitaljournal.com/business/q-a-securing-the-next-normal-through-improved-cybersecurity/article/581637">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
