EU Sanctions Russian Cyber Actors for “Destabilizing Actions”

EU Sanctions Russian Cyber Actors for “Destabilizing Actions”

The European Union (EU) has announced sanctions against Russian cyber actors for carrying out attacks and disinformation campaigns abroad. The European Council imposed measures against 16 individuals and three entities described as undertaking “destabilizing actions abroad” on behalf of the Russian state. It is the first time the intragovernmental agency has issued sanctions under a framework set up in October 2024, with the EU condemning the Kremlin’s “intensifying campaign of hybrid activities” when the powers…

Read More

GenAI: Security Teams Demand Expertise-Driven Solutions

GenAI: Security Teams Demand Expertise-Driven Solutions

Generative AI (GenAI) integration continues to be at the top of many cybersecurity leaders’ minds, but not at all costs, according to a new CrowdStrike survey published on December 17. Of the 1022 global cybersecurity and IT professionals approached for the State of AI in Cybersecurity Survey, 64% are either researching GenAI tools or have already purchased one. Additionally, 70% of respondents said they intend to make a GenAI purchase within the next 12 months….

Read More

Astrill VPN Review: Features, Performance, and Insights

Astrill VPN Review: Features, Performance, and Insights

Astrill VPN’s fast facts Our rating: 3 out of 5.Starting price: $12.50 per user per month.Key features: Good security and anonymity. Some Netflix access. High speeds. Astrill is regarded by some as a premium VPN that users can harness to gain a greater degree of online privacy and security. It is priced accordingly. I found it to be more expensive than competitive solutions. The company is registered in the Seychelles, which helps it get around…

Read More

Breaking Up with Your Password: Why It’s Time to Move On

Breaking Up with Your Password: Why It’s Time to Move On

Data breaches impacted more than 1 billion users in the first half of 2024, up 409% from this time last year, emphasizing the importance of maintaining stealth cyber hygiene. The truth is, as long as there are passwords, there will be breaches. Even passkeys offer insufficient data protection, essentially giving hackers a master key that unlocks all the user’s data. With advancements in technology and increasing cybersecurity threats, it’s time for users to embrace more secure, efficient alternatives…

Read More

12 Days of Learning to Hustle in the New Year

12 Days of Learning to Hustle in the New Year

AI, multicloud, cybersecurity…the tech landscape is evolving faster than ever. If you aren’t up to speed on the skills that matter most in today’s market, you’re missing a huge opportunity—one that could skyrocket your resume to the top of the stack, whether you’re competing for a new role or as a new hire. We invite you to join us for 12 days of skill-building that could transform your 2025. Make sure you scroll all the…

Read More

New APIs Discovered by Attackers in Just 29 Seconds

New APIs Discovered by Attackers in Just 29 Seconds

Newly deployed and potentially unprotected APIs are being discovered in under half a minute, at extremely low cost to threat actors, according to new research from Wallarm. The security firm designed what it claims to be the first ever API honeypot, in order to compile its new report, Gone in 29 Seconds: The World’s First API Honeypot. Its findings are taken from the first 20 days of activity, which took place in November 2024. Wallarm…

Read More

5 reasons why 2025 will be the year of OpenTelemetry

5 reasons why 2025 will be the year of OpenTelemetry

1. Broad adoption by observability platform vendors One key proof point for OTel is the fact that virtually all of the major observability vendors offer integrated support for the open-source standard. According to Gartner’s August 2024 Magic Quadrant for observability platforms, leading vendors such as Chronosphere, New Relic, Datadog, Dynatrace, ServiceNow, Splunk, and SumoLogic support OTel. In fact, Gartner takes points away from Microsoft because, according to the report, Microsoft’s Azure Monitor doesn’t yet offer…

Read More

US Unveils New National Cyber Incident Response Plan

US Unveils New National Cyber Incident Response Plan

The US government has published a new draft National Cyber Incident Response Plan (NCIRP), setting out the roles and responsibilities for public and private sector organizations during cyber incidents. The Cybersecurity and Infrastructure Security Agency (CISA) is inviting feedback on the draft, with the public comment period concluding on January 15, 2025. The draft publication follows an update to the 2016 NCIRP, which was called for in the White House’s 2023 National Cybersecurity Strategy and…

Read More

Sacyr recibe el Premio al Mejor Proyecto de Infraestructura y Cloud en los ‘CIO 100 Awards’

Sacyr recibe el Premio al Mejor Proyecto de Infraestructura y Cloud en los ‘CIO 100 Awards’

Para llevarlo a cabo, no obstante, el proyecto se enfrentó a diversos retos, como que debía integrarse con sistemas ya existentes en Sacyr, adaptarse a legislaciones, idiomas y culturas empresariales en los 11 países en los que opera la compañía, y el cambio significativo en la forma de trabajar al que debieron adaptarse sus empleados.   “El trabajo en equipo ha sido crucial. Este era un proyecto donde participaban más de un centenar de personas a…

Read More

London’s CNI is Under Threat

London’s CNI is Under Threat

London is one of the smartest and most interconnected cities in the world. Digital infrastructure plays a role in almost every facet of society, streamlining public transport, improving healthcare provision, boosting sustainability, and more. However, this reliance on technology has left London’s critical national infrastructure (CNI) perilously vulnerable to digital attacks. As geopolitical relationships deteriorate and nation-state threats to critical infrastructure increase, the UK can no longer ignore this problem. The Impact of Critical National…

Read More
1 107 108 109 110 111 3,571