The main security challenges when adopting cloud services

The main security challenges when adopting cloud services

The popularity of cloud services has increased exponentially in recent years. The prospects of saving on capital and operational expenditures have been significant driving forces in influencing companies to adopt cloud services. Scalability and elasticity are also key drivers that encourage companies to move to the cloud. However, moving to the cloud comes with a lot of challenges. Security is a big concern for organizations that want to migrate to the cloud. Data Security An…

Read More

5 Potential Solutions to the Cybersecurity Talent Shortage

5 Potential Solutions to the Cybersecurity Talent Shortage

The most relevant cybersecurity threat to most businesses may be human, not technical. A sudden wave of cybercrime paired with longstanding tech labor challenges has created a cybersecurity skills gap, leaving companies without the expertise they need. Some companies lack dedicated security staff entirely, while others have a small, overworked department trying to manage massive workloads. Companies that hope to stay safe need to address this talent shortage. Here are five strategies for attracting new…

Read More

Examining the Black Basta Ransomware’s Infection Routine

Examining the Black Basta Ransomware’s Infection Routine

Examining the Black Basta Ransomware’s Infection Routine Ransomware We analyze the Black Basta ransomware and examine the malicious actor’s familiar infection tactics. By: Ieriz Nicolle Gonzalez, Ivan Nicole Chavez, Katherine Casona, Nathaniel Morales May 09, 2022 Read time:  ( words) Black Basta, a new ransomware gang, has swiftly risen to prominence in recent weeks after it caused massive breaches to organizations in a short span of time. On April 20, 2022, a user named Black…

Read More

Gone Phishing: How Ransomware, Log4j, and Other Exploits Use Your Network to Catch the Big Fish

Gone Phishing: How Ransomware, Log4j, and Other Exploits Use Your Network to Catch the Big Fish

Ransomware and Log4j are the latest examples of the ways cyber criminals leverage security weaknesses to spread onto networks and steal or extort large paydays. By Peter Bookman, Founder, and CEO of guardDog.ai   Phishing for the Big One In order to keep yourself and your company safe, it’s important to understand the psychology of a cybercriminal and their objectives. The Internet is like a vast ocean, and like fisherman, these criminals are hunting for…

Read More

Understanding Russian Hacking Tactics to Power Up Security in the Energy Sector

Understanding Russian Hacking Tactics to Power Up Security in the Energy Sector

By Chip Epps, VP of Product Marketing, OPSWAT Every critical infrastructure sector depends on energy to operate, yet the energy industry reports one of the highest rates of cyber incidents. Operational Technology (OT) is often the target of cybercriminals given that it controls the critical physical processes within industrial facilities, and gaining control of it can cause catastrophic damage. Coupled with the critical nature of these environments is the vulnerability of aged legacy systems that…

Read More

Are You Playing A Role In Protecting Your Online Privacy? | McAfee Blog

Are You Playing A Role In Protecting Your Online Privacy? | McAfee Blog

Like most things in life, online privacy is a 2-way street. As consumers, we expect the companies we deal with online to manage and safeguard our data to a super professional level however we also have a role to play here too. So, this Privacy Awareness Week (PAW), let’s focus on what we can do to ensure our personal information is kept as secure, and private as possible.  Privacy Awareness Week  There’s nothing like a…

Read More

The Future of SD-WAN, Post COVID-19

The Future of SD-WAN, Post COVID-19

By: Gabriel Gomane, Senior Product Marketing Manager at Aruba, a Hewlett Packard Enterprise company. For organizations coming out of government-mandated restrictions as a result of the COVID-19 crisis, they have an opportunity to reimagine their respective digital transformation journeys and become more resilient for coping with constant business change. Of course, not all businesses have survived, or thrived, during the past two-plus years. However, each must chart their own course in how they continue to…

Read More

IBM announces first major update to Power9 servers in three years

IBM announces first major update to Power9 servers in three years

IBM will launch the first major update to its i operating system for Power CPU-based servers in three years. The enhancements are largely hardware-oriented, supporting both the older Power9 and the newer Power10, which has been available since last September. IBM’s i OS 7.5, not to be confused with iOS from Apple or IOS from Cisco, will be the first upgrade since version 7.4 appeared in April 2019. Power Systems, formerly known as the mid-range…

Read More

Google Cloud data engineering, analytics systems target manufacturers

Google Cloud data engineering, analytics systems target manufacturers

Google Cloud Platform (GCP) is set to release two new solutions targeted at the manufacturing sector and aiming to ease data engineering and analytics tasks, unifying data from diverse machine assets to offer business insights to factory managers. GCP’s new offerings come at a time when enterprises in the manufacturing sector are adopting systems to meet the challenge of volatile, uncertain, complex and ambiguous (also known as VUCA) conditions arising from global phenomena including the…

Read More

VMware Cloud on AWS GovCloud (US) achieves FedRAMP High JAB authorization and DISA IL5 provisional authorization

VMware Cloud on AWS GovCloud (US) achieves FedRAMP High JAB authorization and DISA IL5 provisional authorization

We are thrilled to announce two major certifications for VMware Cloud on AWS GovCloud (US) that will enable further adoption of the service by US Public Sector agencies and US Department of Defense mission owners.  VMware Cloud on AWS continues to be the fastest and easiest way for vSphere customers to migrate and modernize their infrastructure without the need to refactor and rearchitect their applications. Following our FedRAMP High Agency authorization that was achieved in…

Read More
1 3,097 3,098 3,099 3,100 3,101 4,147