British Army Social Media Accounts Hijacked

British Army Social Media Accounts Hijacked

The British army’s Twitter and YouTube accounts were compromised by a malicious third party on Sunday and used to direct visitors to cryptocurrency scams. The Ministry of Defence (MoD) press office account took to Twitter at around 7pm local time to report the incident. “We are aware of a breach of the army’s Twitter and YouTube accounts and an investigation is underway,” it said. “The army takes information security extremely seriously and is resolving the issue….

Read More

Why Security Configuration Management (SCM) Matters

Why Security Configuration Management (SCM) Matters

In the Godfather Part II, Michael Corleone says, “There are many things my father taught me here in this room. He taught me: keep your friends close, but your enemies closer.” This lesson Vito Corleone taught his son Michael is just as applicable to IT security configuration management (SCM). Faster breach detection Today’s cyber threat landscape is extremely challenging. This is highlighted by the length of time it takes to detect a breach. The gap…

Read More

Feeling Beleaguered? 3 Practical Steps for Cybersecurity Mastery

Feeling Beleaguered? 3 Practical Steps for Cybersecurity Mastery

By Tim Liu, Co-Founder & CTO, Hillstone Networks Cybersecurity may seem an unending challenge, with new vulnerabilities, attacks and breaches announced almost daily. With all the loud headlines, and the potentially large financial and professional impacts of a breach or other attack, it’s easy for CISOs to feel a bit beleaguered. Ransomware, for example, doubled in 2021 according to Verizon’s 2021 Data Breach Investigations Report.  Most industries have come under attack, including education, retail, government,…

Read More

ICO Set to Scale Back Public Sector Fines

ICO Set to Scale Back Public Sector Fines

The UK’s new data protection regulator has signaled a fresh approach to public sector enforcement which will see his office likely levy fewer financial penalties and lower sums. Information commissioner, John Edwards, said last week that such fines ultimately end up negatively impacting public services. “I am not convinced large fines on their own are as effective a deterrent within the public sector. They do not impact shareholders or individual directors in the same way as…

Read More

HackerOne Insider Defrauded Customers

HackerOne Insider Defrauded Customers

A former employee at HackerOne used their access to sensitive information at the bug bounty platform to generate personal profits, the firm has revealed. The unnamed individual’s system access was terminated just 24 hours after a tip off from a customer revealed they had “improperly accessed information in clear violation of our values, our culture, our policies, and our employment contracts.” The firm analyzed internal logs and found that the then-employee, who had access to…

Read More

How Cairn Oil & Gas is using IT to overcome one business challenge after another

How Cairn Oil & Gas is using IT to overcome one business challenge after another

Cairn Oil & Gas is a major oil and gas exploration and production company in India. It currently contributes 25% to India’s domestic crude production (about 28.4 MMT) and is aiming to account for 50% of the total output. The company plans to spend ₹3,16,09 crores (₹31.6 billion) over the next three years to boost its production. The oil and gas industry currently confronts three major challenges: huge price fluctuation with volatile commodity prices, capital-intensive processes…

Read More

The Need of Privacy Certifications for Lawyers | The State of Security

The Need of Privacy Certifications for Lawyers | The State of Security

The widespread adaptability and integration of tools and the professionals who can effectively use them to comply with the law will significantly impact the careers of both lawyers and other legal personnel. One of the fastest-growing areas in the legal profession in the United States is Privacy Law. Privacy certifications endorse attorneys as credentialed privacy lawyers. Privacy certifications can boost income streams and growth potential while increasing job stability and sustainability. In addition, privacy certifications…

Read More

CISO Interview Series: The challenges of being University of Oxford CISO

CISO Interview Series: The challenges of being University of Oxford CISO

The job of a CISO is one of constant change and unexpected challenges.  One of the most energetic environments to govern is that of a university. Universities function not only as academic institutions, but also as research hubs, hosting both curious students, as well as notable scholars.  This is an audience not known for slow-motion progress. They need results, and they expect them quickly.  At a large university, the responsibility of a CISO is dizzying….

Read More

Data Distribution Service: An Overview Part 1

Data Distribution Service: An Overview Part 1

In this three-part series, we focus on Data Distribution Service (DDS), which drives systems such as railways, autonomous cars, spacecraft, diagnostic imaging machines, luggage handling, and military tanks, among others. We’ll also explore the current status of DDS and highlight recommendations enterprises can take to minimize the threats associated with this middleware. But first, let’s discuss what DDS is and how it is applied in various industries. Overview DDS is a standardized middleware software based…

Read More
1 2,864 2,865 2,866 2,867 2,868 4,070