SOHO routers used as initial point of compromise in stealth attack campaign

SOHO routers used as initial point of compromise in stealth attack campaign

Image: the_lightwriter/Adobe Stock Black Lotus Labs, a threat intelligence team within Lumen Technologies, has recently exposed a new modus operandi for an attack campaign that went undiscovered for nearly two years. This campaign is highly sophisticated and possibly state-sponsored. One of its most intriguing characteristics is that it targets small office / home office (SOHO) routers as an initial point of compromise, in addition to being particularly stealth. The ZuoRAT attack chain At the beginning…

Read More

“Know your enemy,” and other cybersecurity lessons from Sun Tzu’s Art of War

“Know your enemy,” and other cybersecurity lessons from Sun Tzu’s Art of War

The key on the cyber battlefield, like on the traditional military battlefield, is understanding that there will indeed be many battles By Shmulik Yehezkel (Colonel, res), Chief Critical Cyber Operations Officer at CYE Security As a cybersecurity professional and a reserve field officer in the Israeli military, I have found many valuable insights on the pages of The Art of War, written by the fifth century Chinese military general Sun Tzu. One particular but often…

Read More

What It Takes to Be a Winner in Tech

What It Takes to Be a Winner in Tech

Claire Blythe, VP, global tech and operations at GfK (the AI-powered intelligence platform revolutionizing real-time access to critical knowledge), won Role Model of the Year at Computing’s recent Women in Tech Excellence awards. We ask for her secrets to success in technology leadership, and how women can rapidly advance their careers in the field. What does your role encompass? As the VP of global tech and operations for the Marketing and Consumer Intelligence arm of…

Read More

Get 15 hours of basic cybersecurity education online for just $29

Get 15 hours of basic cybersecurity education online for just

This bundle provides a strong overview of the cybersecurity field. Image: Melinda Nagy/Adobe Stock As cybercriminals get savvier and more technical, the demand for data and IT security grows larger. From crypto scams to data breaches and beyond, individuals and companies alike are always looking for ways to protect their precious digital assets. Whether you’re interested in protecting your own digital life or you might want to pursue a new career in cybersecurity, check out…

Read More

Digital Leadership — Outlook and Trends

Digital Leadership — Outlook and Trends

With a career that spans over four decades, Alex Siow is well-known as Singapore’s first Chief Information Officer in the 1990s. He is the author of Leading with IT: Lessons from Singapore’s First CIO, which is written for the next generation of CIOs, CTOs, and other executives who work closely with technology. It offers practical tips, case studies, and personal insights that shed light on the central competencies required of CIOs. Digital Disruption for Business There…

Read More

Cisco CX was All In at Cisco Live 2022

Cisco CX was All In at Cisco Live 2022

Thimaya Subaiya’s keynote address at Cisco Live Last week’s Cisco Live 2022 was incredible! Our time together felt more special than in years past. Not only were we back in person after almost three years with thousands of customers and partners onsite, but we were able to include millions more watching the digital broadcast remotely. From the first keynote to the amazing innovation sessions, you could feel the excitement and energy percolating throughout the event….

Read More

It’s Social Media Day! Here’s How to Protect Yourself From Social Engineering Online | McAfee Blog

It’s Social Media Day! Here’s How to Protect Yourself From Social Engineering Online | McAfee Blog

It’s Social Media Day! How are you celebrating? Reposting your very first profile picture from a decade ago? Sharing your most-loved status update or the photo you’re most proud of? This year, consider commemorating the day by learning more about how to keep your information safe. Enjoy your favorite platform, but be on the lookout for scams, such as social engineering.  What is Social Engineering  Social engineering is a cybercrime common to social media sites….

Read More

Protect your browsing for life with this innovative hardware

Protect your browsing for life with this innovative hardware

The Deeper Connect Mini Decentralized VPN & Firewall Hardware provides reliable and secure network connectivity worldwide. Image: StackCommerce There are many great VPN solutions out there, and given how rampant cyber crime is these days, it’s just smart to utilize one. But most VPNs come with some drawbacks. You have to pay expensive subscription fees, they slow down your browsing and they disconnect easily among a number of other pitfalls. Wouldn’t you like a VPN…

Read More

Data science drives big decisions at Kohl’s

Data science drives big decisions at Kohl’s

Long before the advent of customer data platforms (CDPs), Kohl’s business model centered on collecting and cultivating customer data. “We’ve had a homegrown customer data environment for decades,” says Paul Gaffney, CTO and supply chain officer at the $19.4 billion American department store chain. “And we’re quite happy with our custom implementation.” The Milwaukee, Wis.-based retailer originally built its homegrown on-premises CDP on Netezza, creating robust customer profiles based on the chain’s large credit card…

Read More

The XaaS trap: ‘Everything as a service’ isn’t anything IT really needs

The XaaS trap: ‘Everything as a service’ isn’t anything IT really needs

“Everything as a service” has become quite buzzy in IT over the past few years. The concept, which for some reason bears the acronym XaaS, just means delivering all of IT’s computing services over the internet, charging for and paying per use. How is this different from “cloud”? Beats me. What XaaS really does, however, is put the final nail in the coffin of what was once an important development in IT architecture, turning it…

Read More
1 2,885 2,886 2,887 2,888 2,889 4,083