Cisco reports vulnerabilities in products including email and web manager

Cisco reports vulnerabilities in products including email and web manager

Cisco has issued alerts for a vulnerability found in its email security and web management products that could allow an authenticated remote actor to retrieve sensitive information from an affected device. An advisory issued by Cisco this week outlined that the vulnerability—detected in the web management interface of Cisco Secure Email and Web Manager, known formerly as Cisco Security Management Appliance (CSMA), and Cisco Email Security Appliance (ESA)—allows an authenticated actor to extract sensitive information…

Read More

#InfosecurityEurope2022: Lawyers Update Security for New Ways of Working

#InfosecurityEurope2022: Lawyers Update Security for New Ways of Working

Legal and professional services firms need to adapt their technology and security to fit new ways of working, according to a senior CISO in the sector. During a Talking Tactics session at Infosecurity Europe 2022, Christian Toon, CISO at legal practice Pinsent Masons, pointed out that law firms are staffed by “intelligent people who get confidentiality.” Yet, that does not automatically translate into an understanding of digital risks. Firms also face a challenge dealing with high volumes…

Read More

Lockbit 2.0 accounts for 40% of May ransomware attacks

Lockbit 2.0 accounts for 40% of May ransomware attacks

<!– Lockbit 2.0 accounts for 40% of May ransomware attacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Technical teams are struggling with access issues that impact productivity and security

Technical teams are struggling with access issues that impact productivity and security

<!– Technical teams are struggling with access issues that impact productivity and security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Public Sector Must Remain Diligent as Cloud and Ransomware Intersect

Public Sector Must Remain Diligent as Cloud and Ransomware Intersect

By Rick Vanover, Senior Director of Product Strategy at Veeam Often, when a citizen interacts with a government agency, a piece of personal information is provided and stored. This means ransomware attacks threaten the exposure of both internal government data as well as citizen information. Being the proprietor of citizen data – from motor vehicle records to photo identification documents – puts government agencies in a more precarious position than private companies. According to a…

Read More

#InfosecurityEurope2022: Disinformation Warfare – How Do We Tackle Fake News?

#InfosecurityEurope2022: Disinformation Warfare – How Do We Tackle Fake News?

On the third and final day of InfoSecurity Europe 2022, Ian Hill, director of cyber security at BGL Insurance, hosted a roundtable discussion on disinformation warfare, exploring the relationship between the subjective truth and objective facts in the context of fake news. The role that psychology, social media and culture play in contextualizing and interpreting information was discussed, as well as the increased need for AI-based cybersecurity techniques and technology to detect and mitigate such…

Read More

Cisco at DistribuTECH 2022

Cisco at DistribuTECH 2022

Last month Cisco joined over 14,000 attendees in Dallas for DistribuTECH, the leading annual energy transmission and distribution event for North America. It was wonderful to be back at a live event and connectwith all the colleagues and customers.    Utilities worldwide work with Cisco to modernize and digitize their business to deliver power and services globally. Events such as DistribuTECH illustrate how IT (Information Technology) and OT (Operational Technology) convergence is transforming the utility market,…

Read More

OT:ICEFALL Research from Forescout Explores Insecure-by-Design State of Operational Technology

OT:ICEFALL Research from Forescout Explores Insecure-by-Design State of Operational Technology

OT:ICEFALL Research from Forescout Explores Insecure-by-Design State of Operational Technology The latest research from Forescout’s Vedere Labs explores the state of risk management in operational technology through the lens of 56 insecure-by-design vulnerabilities. Background On June 20, Forescout’s Vedere Labs published their latest research findings into operational technology (OT) vulnerabilities titled OT:ICEFALL. This group has been examining vulnerabilities affecting OT security for a few years now and has produced notable findings including: NUCLEUS:13, NAME:WRECK, NUMBER:JACK…

Read More

Why You Need to Get on the Zero Trust Network Access Express Lane

Why You Need to Get on the Zero Trust Network Access Express Lane

Today’s work from anywhere culture, escalating ransomware, and an explosion of Internet of Things (IoT) devices are among the trends that are driving enterprises to rethink their approach to secure network access. Virtual Private Networks (VPNs) have long been the go-to method for providing remote users secure access to the corporate network. But time has shown that VPNs have serious limitations and are not the most secure option. IT leaders are rethinking their strategies and…

Read More

US passes bills to foreground national cybersecurity

US passes bills to foreground national cybersecurity

<!– US passes bills to foreground national cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 2,927 2,928 2,929 2,930 2,931 4,109