What Microsoft’s shift to passwordless means for cybersecurity

What Microsoft’s shift to passwordless means for cybersecurity

What Microsoft’s shift to passwordless means for cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

8 Great Tech Gifts for Developers

8 Great Tech Gifts for Developers

Got a software developer on your “nice” list? Or, maybe you’re the dev and need to drop some hints to people who have you on their list? Here are some gift ideas programmed to make devs happy this holiday. (Alternatively, if you’re trying to please someone in the networking realm, check out my previous guide, Great Gifts for the Network Pro Who Has Everything.)  1. A hardware scratch pad For hacking around and experimenting with…

Read More

Becoming a People Leader at Cisco – Cisco Blogs

Becoming a People Leader at Cisco – Cisco Blogs

For almost every professional, there comes a time when you must decide if you’re ready to take the step into leadership. We’re all leaders in our own right, but what I am talking about specifically here is being a people leader. For me, that came by way of Cisco’s SE Transitions and Leadership Development Program (STLDP) – a program designed to help grow careers and get talent on the leadership track. This intrigued me, but…

Read More

Police Arrest 1800 in Major Money Laundering Crackdown

Police Arrest 1800 in Major Money Laundering Crackdown

European police have identified over 18,000 money mules and arrested 1800 in a significant crackdown on money laundering. Some 27 countries took part in the seventh European Money Mule Action (EMMA 7), which ended yesterday, according to Europol. The two-and-a-half-month initiative saw police from these jurisdictions, along with Europol and Eurojust, work with the European Banking Federation (EBF), the FinTech FinCrime Exchange and private sector firms such as Western Union, Microsoft and Fourthline. The aim was…

Read More

LoRa takes a trip to the moon and back, chirping all the way

LoRa takes a trip to the moon and back, chirping all the way

LoRa is living up to its name, literally. A shortened version of “long range” (ironic!), LoRa is a wide-area wireless modulation technique that encodes information on radio waves. LoRa, which has been around since 2015, is derived from Chirp Spread Spectrum (CSS) technology and uses chirp pulses to transmit small bits of data. It also uses very little power. The proprietary technology is owned by semiconductor supplier Semtech Corp LoRa’s value is in transmitting data…

Read More

Russian Bulletproof Hosting Kingpin Gets Five Years

Russian Bulletproof Hosting Kingpin Gets Five Years

A Russian man has been sentenced to five years behind bars for his part in a bulletproof hosting venture that helped support countless cybercrime operations. Aleksandr Grichishkin, 34, and co-conspirators Pavel Stassi, 30, of Estonia, Aleksandr Skorodumov, 33, of Lithuania, and 34-year-old Russian, Andrei Skvortsov, had previously pleaded guilty to conspiracy to engage in a racketeer-influenced corrupt organization. Grichishkin is purportedly the organization’s founder, which rented out IP addresses, servers and domains to cyber-criminals, who…

Read More

Double Extortion Ransomware Victims Soar 935%

Double Extortion Ransomware Victims Soar 935%

Researchers have recorded a 935% year-on-year increase in double extortion attacks, with data from over 2300 companies posted onto ransomware extortion sites. Group-IB’s Hi-Tech Crime Trends 2021/2022 report covers the period from the second half of 2020 to the first half of 2021. During that time, an “unholy alliance” of initial access brokers and ransomware-as-a-service (RaaS) affiliate programs has led to a surge in breaches, it claimed. In total, the number of breach victims on ransomware data…

Read More

CIS Control 13: Network Monitoring and Defense | The State of Security

CIS Control 13: Network Monitoring and Defense | The State of Security

Networks form a critical core for our modern-day society and businesses. People, processes, and technologies should be in place for monitoring, detecting, logging, and preventing malicious activities that occur when an enterprise experiences an attack within or against their networks. Key Takeaways for Control 13 Enterprises should understand that their systems and networks are never perfectly immune to a cyberattack. Enterprises can leverage the safeguards provided by Control 13 to guide the evolution and maturity…

Read More

Reimagining mobile security for the way we live our lives today, tomorrow, and beyond.

Reimagining mobile security for the way we live our lives today, tomorrow, and beyond.

Online is a little different for everyone How do you connect online these days? I’ll give you an example from my own life: From my 15-year old son to my 80-year-old mother, not one of us leaves the house without our phone. And today, there isn’t a single thing you can’t do on your phone. It’s the minicomputer that goes where you go.  This trend in the way we connect is reflected in recent data too. In fact, we’ve found that the average consumer spends 6 hours…

Read More

Data Center Disaggregation 101 – How to Build a New Edge Computing Infrastructure

Data Center Disaggregation 101 – How to Build a New Edge Computing Infrastructure

As the data center continues to become more disaggregated, the data center itself is also becoming part of a larger distributed ecosystem that includes cloud resources and edge computing. With this shift comes the need to reshuffle IT assets. For companies that have for decades been locked into rigid, expensive single-vendor data center infrastructure, the prospect of disaggregation is extremely appealing. By separating hardware from software and deploying more modular units that can be mixed…

Read More
1 3,159 3,160 3,161 3,162 3,163 3,817