TL;DR as a service

Highlight the best Information security info and share on social media

Information security

Security teams plan a new pandemic quarantine for BYOD devices headed back to the office
A survey from Blackberry finds that IT departments are worried about unpatched devices connecting to corporate networks as offices reopen.
Biden Administration Likely Retaining Trump Doctrine on Cybersecurity in Space
A presidential directive aimed at implementing cybersecurity in space systems is under review but will likely remain in effect as the Biden administration looks to sustain commercial enterprise in the domain.
Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems | IT PRO
The US Department of Defense (DoD) has expanded its Vulnerability Disclosure Program (VDP) to include all publicly accessible DoD websites and systems.
DoD Lets Researchers Target All Publicly Accessible Info Systems
The Department of Defense (DoD) has expanded its vulnerability disclosure program to include all publicly accessible defense information systems, officials announced this week.
Wanted: The (Elusive) Cybersecurity 'All-Star'
Separate workforce studies by (ISC) 2 and ISACA point to the need for security departments to work with existing staff to identify needs and bring entry-level people into the field.
World Password Day: How to keep yourself and your company data secure
The first Thursday in May is World Password Day. Learn some tips for what your organization should do to foster good password management techniques.
Image: Daniel Chetroni/Shutterstock
How one phony vaccine website tried to capture your personal information
Recently seized by the government, the site spoofed an actual company developing a coronavirus vaccine in an effort to steal personal data for malicious purposes.
Security researchers take control of a Tesla via drone | IT PRO
Last week at an IT security conference, a pair of cyber security researchers demonstrated how they could unlock and open a Tesla's doors using only a drone outfitted with a Wi-Fi dongle.
21 nails in Exim mail server: Vulnerabilities enable 'full remote unauthenticated code execution', millions of servers at risk
According to one recent survey nearly 60 per cent of mail servers visible on the internet use Exim, followed by Postfix at 34 per cent. 1Qualys said a Shodan search revealed nearly 4 million Exim servers exposed to the internet. 1
read and highlight
Poor collaboration between NOC and SOC hampers digital transformation efforts
Even though they both seek common ends, networking and security teams are often at odds with each other, slowing their companies down.