vFunction tool assesses technical debt for app modernization

vFunction tool assesses technical debt for app modernization

App modernization platform provider vFunction has released a new tool dubbed vFunction Assessment Hub, to help CIOs and other IT decision makers understand the complexity and risk of their existing legacy applications before deciding to modernize them — a process that typically involves taking on technical debt. Market demand for faster and better services along with the impact of the pandemic on revenue and operations has put pressure on companies to modernize their legacy apps….

Read More

Cisco warns of critical vulnerability in virtualized network software

Cisco warns of critical vulnerability in virtualized network software

Multiple vulnerabilities have been discovered in Cisco’s Enterprise NFV Infrastructure Software (NFVIS). The worst of the vulnerabilities could let an attacker escape from the guest virtual machine (VM) to the host machine, Cisco disclosed. The other two problems involve letting a bad actor inject commands that execute at the root level and allowing a remote attacker to leak system data from the host to the VM. NFVIS is Linux-based infrastructure software designed to help enterprises…

Read More

Google, Apple, Microsoft promise end to passwords, courtesy of your mobile phone

Google, Apple, Microsoft promise end to passwords, courtesy of your mobile phone

Adopting a new authentication method from the FIDO Alliance, the three major OS vendors will let you use encrypted credentials stored on your phone to automatically sign you into your online accounts. Image: Valery/Adobe Stock A future without passwords may be closer than we think, at least when a new initiative to enlist your smartphone as a mobile authenticator gets off the ground. On Thursday, the FIDO Alliance announced a new type of authentication that…

Read More

$43 billion stolen through Business Email Compromise since 2016

 billion stolen through Business Email Compromise since 2016

Over US $43 billion has been lost through Business Email Compromise attacks since 2016, according to data released this week by the FBI. The FBI’s Internet Crime Complaint Center (IC3) issued a public service announcement on May 4 2022, sharing updated statistics on Business Email Compromise (BEC) attacks which use a variety of social engineering and phishing techniques to break into accounts and trick companies into transferring large amounts of money into the hands of…

Read More

Considerations for third-party physical security risk

Considerations for third-party physical security risk

<!– Considerations for third-party physical security risk | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Announcing Cisco Networking Academy’s Q3 Be the Bridge Award winners

Announcing Cisco Networking Academy’s Q3 Be the Bridge Award winners

After several years of events that have changed the world, it’s easy to overlook the good news. News such as an additional 800 million people connecting to the internet around the globe between 2019 and 2021, bringing new opportunities, particularly in developing countries. And while figures for developed countries such as the United States­ appear static, (internet usage only increased by one percent of the population between 2016 and 2021), they are anything but: Internet…

Read More

Latest Cohort Announced for NCSC For Startups

Latest Cohort Announced for NCSC For Startups

Five cybersecurity startups have been selected to participate in the latest NCSC For Startups program, which launched last year. The new cohort was chosen for their innovative approaches to tackling the growing ransomware threat, with particular relevance to three challenges identified by the UK’s National Cyber Security Centre (NCSC): Defending SMEs from ransomware by providing accessible, low-cost protection Encouraging firms to implement secure backups to minimize the impact of an attack Addressing risks posed by Remote Desktop Protocol (RDP) as more…

Read More

Hybrid approach strengthens inclusivity at COP26

Hybrid approach strengthens inclusivity at COP26

The COP26 summit was much more than headline negotiations between global leaders. It included 85 country and NGO pavilions and hundreds of corporate events, along with YOUNGO, the Official Children’s and Youth constituency of the United Nations Framework Convention on Climate Change (UNFCCC). Among calls for action from global leaders at COP26, this was an opportunity to network, share ideas, listen to fresh perspectives, and reach a new audience through global media coverage. This meant…

Read More

Announcing the public availability of the Cisco Cloud Controls Framework (CCF)

Announcing the public availability of the Cisco Cloud Controls Framework (CCF)

Customers globally are requesting – and often requiring – SaaS providers to demonstrate their commitment to security, availability, confidentiality, and privacy. While attaining global security certifications has become table-stakes for many to do business, it’s no easy feat. Many organizations struggle to keep pace with this resource- and time-intensive process. As the complexity of market demand grows, SaaS providers need an efficient way to simplify and streamline efforts to attain security certifications. They are looking…

Read More

Employing travel and hospitality fraud mitigation tactics

Employing travel and hospitality fraud mitigation tactics

<!– Employing travel and hospitality fraud mitigation tactics | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 3,098 3,099 3,100 3,101 3,102 4,142