RSA 2022: Cyber Attacks Continue to Come in Ever-Shifting Waves

RSA 2022: Cyber Attacks Continue to Come  in Ever-Shifting Waves

Supply chains, trust, and the Internet itself remain prime targets.  When Russia launched wide-ranging cyber-attacks while its army invaded Ukraine, it also deployed waves of wiper malware to destroy data.   The first wave targeted the data on the disks. As Ukraine fortified its defenses in that area, the second wave left the data on the disks alone and went after the metadata. The third wave bypassed the two previous targets and attacked the file systems….

Read More

Understanding the Ransomware Ecosystem: From Screen Lockers to Multimillion-Dollar Criminal Enterprise

Understanding the Ransomware Ecosystem: From Screen Lockers to Multimillion-Dollar Criminal Enterprise

A new report from Tenable Research explores the key players in the ransomware ecosystem and the tactics that have helped propel it from a fledgling cyberthreat into a force to be reckoned with. Ransomware is a constantly evolving cyberthreat, and it is through its evolution that ransomware has managed to not only survive, but thrive. There are a number of reports that detail ransomware’s evolution, from the earliest form of ransomware known as the AIDS…

Read More

Identity-Related Breaches Hit 84% of US Firms in 2021

Identity-Related Breaches Hit 84% of US Firms in 2021

The number of security breaches stemming from stolen or compromised identities has reached epidemic proportions, according to new data from the non-profit Identity Defined Security Alliance (IDSA). The IDSA polled 500 US identity and security professionals to compile its 2022 Trends in Securing Digital Identities report. It found that 84% had experienced an identity-related breach in the past year, with the vast majority (78%) claiming it had a direct business impact. Part of the problem is the soaring volumes…

Read More

How to Set Up a VPN | McAfee Blog

How to Set Up a VPN | McAfee Blog

In today’s connected world, you can do so much on the internet. It’s never been easier to stay entertained (Netflix, anyone?), informed, and productive. But it’s important to keep your online activities private and safe, whether you’re checking social media, using a streaming service, or banking online.   With the right solutions, you can have a worry-free online experience.  Thankfully, virtual private network (VPN) software keeps your data secure by hiding your IP address (the address…

Read More

5 common consultant negotiation tactics and how to protect your interests

5 common consultant negotiation tactics and how to protect your interests

To execute a successful digital transformation initiative, you are likely to establish consulting provider relationships.  A key step in creating an effective and meaningful relationship is establishing mutually aligned expectations and a commercial agreement. This takes planning. Unfortunately, many organizations find themselves susceptible to the tactics used by consultants to manage their risk and optimize a commercial arrangement to their benefit.  Following are the primary tactics organizations must be aware of: 1. Establishing relationship leverage….

Read More

How to reduce cloud costs

How to reduce cloud costs

The more workloads that you migrate to the cloud, the more difficult it becomes to predict monthly cloud costs. Cloud services vendors such as Amazon, Google and Microsoft can help organizations avoid capital costs for new hardware, but that doesn’t necessarily mean that you have made the most cost-effective decisions about the particular services that these and other cloud vendors offer. And while it is great that you’re only paying for the services you need, trying…

Read More

Proofpoint dispels commonly held threat actor assumptions in new report

Proofpoint dispels commonly held threat actor assumptions in new report

The company found that Google-related URLs were the most frequently abused last year. Image: xijian / Getty Images As part of Proofpoint’s “2022 Social Engineering report” it was found that many cybercriminals employ unanticipated behaviors as part of their hacking methods. Threat actors typically are not thought of as engaging with their victims or attempting to disguise legitimate technologies as part of their schemes. However, Proofpoint found that many hackers use some of these methods…

Read More

NIST SP 800-161r1: What You Need to Know | The State of Security

NIST SP 800-161r1: What You Need to Know | The State of Security

Modern goods and services rely on a supply chain ecosystem, which are interconnected networks of manufacturers, software developers, and other service providers. This ecosystem provides cost savings, interoperability, quick innovation, product feature diversity, and the freedom to pick between rival providers. However, due to the many sources of components and software that often form a final product, supply chains carry inherent cybersecurity risks. Organizations need to be aware of the risks associated with goods and services…

Read More

How to stop malicious privileged user attacks

How to stop malicious privileged user attacks

Image: Adobe Must-read security coverage A 2022 report on privileged user threats by Ponemon Institutes suggests that privileged user attacks skyrocketed by 44% in 2020, with the cost per attack at $15.38 million. With the colossal damage privileged user attack leaves in their wake, averting security threats coming from malicious privileged users and the threats they may pose to your organization has become more crucial than ever. Who is a privileged user? A privileged user…

Read More

A Golden Era of HPC in Government Meets Accelerating Demands

A Golden Era of HPC in Government Meets Accelerating Demands

When Seymour Cray built what is generally considered to be the first supercomputer in 1964, it ran 1 megaflop, (a million floating point operations per second). Today, the Frontier supercomputer at Oak Ridge National Laboratory in Tennessee performs one quintillion (a billion billion) operations per second. But the New York Times recently reported that Chinese researchers had broken the exascale computing barrier, performing a calculation that would have taken the Oak Ridge National Laboratory’s former machines 10,000 years to complete in a…

Read More
1 2,924 2,925 2,926 2,927 2,928 4,100