Technical support scam still alive and kicking

Technical support scam still alive and kicking

Image: Adobe Stock A technical support scam, sometimes referred to as “tech support scam,” is a kind of online fraud in which a scammer reaches a target, generally by phone, and pretends to offer a technical support service. Using social engineering tricks, the fraudster persuades the target to provide access to his computer via a remote access tool and pretends to fix severe computer problems like dangerous malware infection or data theft. Once done, the…

Read More

Justin DePalmo named VP, CISO at GDIT

Justin DePalmo named VP, CISO at GDIT

Justin DePalmo named VP, CISO at GDIT | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Security magazine’s AMA video podcast series premieres August 10, 2022

Security magazine’s AMA video podcast series premieres August 10, 2022

Security magazine’s AMA video podcast series premieres August 10, 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Report Provides Updates on July’s Maui Ransomware Incident

Report Provides Updates on July’s Maui Ransomware Incident

Cybersecurity researchers from Kaspersky have published a new advisory providing additional technical details and attribution findings regarding the Maui ransomware incident unveiled by the Cybersecurity and Infrastructure Security Agency (CISA) in July. The report also extends CISA’s “first seen” date from May 2021 to April 15 2021, and the geolocation of the target to other countries, including Japan, India, Vietnam and Russia. “Because the malware in this early incident was compiled on April 15th, 2021,…

Read More

Zero Trust Architecture: Adoption, Benefits, and Best Practices

Zero Trust Architecture: Adoption, Benefits, and Best Practices

What is Zero Trust security, and what are the benefits? Here’s how to prevent data breaches by staying on top of security with Zero Trust architecture. By Harish Akali, Chief Technology Officer, ColorTokens   ‘Trust Nothing, Verify Everything’: Benefits and Best Practices of Zero Trust Architecture No matter the industry or size, organizations have been embracing digital transformation at an astonishing pace. Necessarily, the cybersecurity industry is seeing a shift that many argue is long…

Read More

People Behind CSR at Cisco: How product energy efficiency contributes to a sustainable future

People Behind CSR at Cisco: How product energy efficiency contributes to a sustainable future

This blog is part of our series that focuses on the people behind Corporate Social Responsibility (CSR) at Cisco. Each blog highlights a different Cisco employee whose work makes a positive impact on people, communities, or the planet. As a large, global company, we have a responsibility to decrease the greenhouse gas (GHG) emissions from our operations and products. This starts with understanding the contributors to our emissions footprint. Customers’ use of Cisco products accounts for…

Read More

AI for Decision-Makers: How to Win Trust from the Outset

AI for Decision-Makers: How to Win Trust from the Outset

In business, data science and artificial intelligence are usually geared towards powerful efficiencies and growth. User trust is often overlooked. This can quickly morph into a major problem, particularly when AI is introduced to support strategic choices. Data science and AI teams focus constantly on methodology and accuracy. This is critical, ensuring algorithms deliver valuable insights, analytics and support increased automation. Nevertheless, most organizations face growing problems around users’ trust in algorithms. On the one…

Read More

FFIEC Cybersecurity Maturity Assessment Tool

FFIEC Cybersecurity Maturity Assessment Tool

Financial institutions have to be vigilant in the face of a continually evolving cybersecurity threat landscape. As these have attacks have evolved, regulatory bodies have updated their regulations to account for the increasing threat of cyber risk. In 2015, following a significant increase in nation state and hacktivist attacks on U.S. financial institutions, the FFIEC released new guidance and a Cybersecurity Assessment Tool for institutions to self assess their risks and determine their cybersecurity maturity….

Read More

Delivering virtual care at scale

Delivering virtual care at scale

Virtual care comes in many forms and the term covers a multitude of use cases and workflows. We find that providers can deliver better remote care, at lower cost, when they standardize on a virtual care platform with the ability to support all core use cases. At Cisco, we’ve taken a full-stack platform approach that leverages the power of our Webex service, together with software and hardware deployed across the cloud and the premise, to…

Read More

Why Working for Cisco Means Better Sustainability for the Future

Why Working for Cisco Means Better Sustainability for the Future

Cisco’s effort to power an inclusive future for all is not solely focused on enabling digitisation for businesses, but (as stated within our Annual Purpose Report) looks to act boldly and deliberately to drive fairness, inclusion for our people, and equitable access to opportunity for our global communities. In doing so, Cisco’s commitment to achieve our purpose, also ensures a sustainable and regenerative future for our planet so that people and ecosystems can thrive. Here…

Read More
1 2,791 2,792 2,793 2,794 2,795 4,090