What makes an identity? 

What makes an identity? 

What makes an identity?  | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Solar Sister is addressing gender equity, energy poverty, and climate change

Solar Sister is addressing gender equity, energy poverty, and climate change

The Transformational Tech series highlights Cisco’s nonprofit grant recipients that use technology to help transform the lives of individuals and communities. When a person lives in a community that doesn’t have access to a power grid, it means no electricity. When you lack access to sustainable and affordable energy services and products, it is called energy poverty. People experiencing energy poverty are forced to use higher-cost fuels, like running diesel fuel through a generator and using…

Read More

Oki Mek named CISO at Equideum Health

Oki Mek named CISO at Equideum Health

Oki Mek named CISO at Equideum Health | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

The Challenge of Utilizing Multiple Security Tools

The Challenge of Utilizing Multiple Security Tools

Greetings everyone, and welcome to this week’s blog. This week, I’m diving into number six in our “Top 10 List of the Challenges Cybersecurity Professionals Face,” as found in our Cybersecurity Insights Report 2022: The State of Cyber Resilience: Lack of integrated cyber-security solutions. To deal with the cyberthreats they face every day, Enterprise Security Decision Makers seek new and well-supported solutions. They look for solutions that are easy to use and integrate with other cybersecurity…

Read More

ATD banks on B2B digital transformation

ATD banks on B2B digital transformation

For the past decade, the Amazon.com effect has spread digital disruption to every corner of the B2C world, spurring incumbent, consumer-facing enterprises to undertake massive digital transformation initiatives as a matter of survival. But B2B companies have not been entirely immune to the shift toward digital services, with many of late launching transformations of their own centered around revamping old ways of conducting business in a new world. American Tire Distributors is one such entity…

Read More

Data as a service: Top vendors offering data on tap

Data as a service: Top vendors offering data on tap

With data-driven decisions and digital services at the center of most businesses these days, enterprises can never get enough data to fuel their operations. But not every bit of data that could benefit a business can be readily produced, cleansed, and analyzed by internal means. Enter data-as-a-service providers: Entities that offer data on tap for a fee for your enterprise to use. Who needs data as a service (DaaS)? Anyone with an enterprise that craves…

Read More

What is DRaaS and how it can save your business from disaster

What is DRaaS and how it can save your business from disaster

Disaster Recovery as a Service (DRaaS) provides data replication, hosting, and recovery services from the cloud in the event of a disaster, power outage, ransomware attack, or other business interruption. DRaaS backs up data, applications, and IT infrastructure to the cloud, with providers typically having geographically dispersed data center footprints. In the event of a disaster, the business will failover to the DRaaS provider’s data center in a different region.  As opposed to traditional disaster…

Read More

Data Breach Disclosures Surge 14% in Q1 2022

Data Breach Disclosures Surge 14% in Q1 2022

The number of publicly reported data breaches in the US increased by double digits year-on-year in the first three months of 2022, according to the Identity Theft Resource Center (ITRC). The non-profit claimed that the increase represents the third successive year in which Q1 figures have exceeded those recorded 12 months previously. The vast majority (92%) of breaches recorded by the ITRC were traced back to cyber-attacks, with phishing and ransomware the top two causes overall. However,…

Read More

Microsoft and Partners Disrupt ZLoader Botnet

Microsoft and Partners Disrupt ZLoader Botnet

Microsoft has revealed how a coordinated operation helped disrupt a notorious Trojan used widely around the world to facilitate ransomware and other attacks. ZLoader was spawned from the infamous Zeus banking Trojan, but like similar malware TrickBot and Emotet, it underwent significant development over the years, adding new functionality. As such, it soon evolved from a banking Trojan into malware capable of compromising devices, which its operators then sold as a service to other threat…

Read More

Elementor Fixes Critical Bug in Popular WordPress Plugin

Elementor Fixes Critical Bug in Popular WordPress Plugin

The developer of a popular WordPress plugin has updated its product to fix a critical vulnerability that could be exploited to change the appearance of websites. Elementor is marketed as a leading website building platform for WordPress, enabling over five million users to easily create websites for themselves or their business without writing any code. However, last week researchers at security firm Plugin Vulnerabilities discovered suspicious activity related to the plugin. “We couldn’t find any recent…

Read More
1 3,125 3,126 3,127 3,128 3,129 4,114