NSA urges businesses to adopt zero trust principles for network security

NSA urges businesses to adopt zero trust principles for network security

The National Security Agency this week issued detailed recommendations for businesses trying to secure their networking infrastructure against attacks, giving safe configuration tips for commonly used networking protocols and urging the use of basic security measures for all networks. The NSA’s report began by highlighting the importance of zero trust principles for network security, but the bulk of it covers specific steps network administrators should take to keep their infrastructure safe from compromise. Configuration tips…

Read More

U.S. Senate passes cybersecurity bill amid warnings of Russian cyberattacks

U.S. Senate passes cybersecurity bill amid warnings of Russian cyberattacks

U.S. Senate passes cybersecurity bill amid warnings of Russian cyberattacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Senate Passes Strengthening American Cybersecurity Act

Senate Passes Strengthening American Cybersecurity Act

The United States Senate has passed legislation requiring critical infrastructure operators and federal agencies to report cyber-attacks within 72 hours and ransomware payments within 24 hours. America’s Upper House approved the Strengthening American Cybersecurity Act of 2022 on Tuesday. The Act combines language from three bills, including the cyber-incident reporting bill, introduced to the Senate by the Senate Homeland Security and Governmental Affairs Committee leaders in September 2001. The legislation would impact companies across 16 federally designated critical infrastructure sectors, including…

Read More

Cyber-Criminals Exploit Invasion of Ukraine

Cyber-Criminals Exploit Invasion of Ukraine

Cyber-criminals are exploiting Russia’s ongoing invasion of Ukraine to commit digital fraud. In a blog post published Friday, researchers at Bitdefender Labs said they had witnessed “waves of fraudulent and malicious emails,” some of which were engineered to exploit the charitable intentions of global citizens towards the people of Ukraine.  Since March 1, researchers have been tracking two specific phishing campaigns designed to infect victims with Agent Tesla and Remcos removed access Trojans.  Agent Tesla is a malware-as-a-service (MaaS)…

Read More

Vulnerabilities in Over 100k Medical Infusion Pumps

Vulnerabilities in Over 100k Medical Infusion Pumps

Most smart medical infusion pumps have known security gaps that make them vulnerable to hackers, according to new research by Palo Alto Networks’ Unit 42. Smart infusion pumps are network-connected medication delivery devices that use a combination of computer technology and drug libraries to administer medications and fluids to patients while limiting the potential for dosing errors.  The research team reviewed crowdsourced data from scans of more than 200,000 infusion pumps on the networks of hospitals and other healthcare…

Read More

Nonprofit Cyber launches with mission to increase cybersecurity awareness

Nonprofit Cyber launches with mission to increase cybersecurity awareness

Nonprofit Cyber launches with mission to increase cybersecurity awareness | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

ThousandEyes in Catalyst 9000 Switches, Part 2: How to install the agent using Cisco DNA Center? – Cisco Blogs

ThousandEyes in Catalyst 9000 Switches, Part 2: How to install the agent using Cisco DNA Center? – Cisco Blogs

Part 2 of the 3-part ThousandEyes in Catalyst 9000 Switches Series: How to install the agent using Cisco DNA Center? In the first part of this blog series, we covered the benefits of installing  ThousandEyes Enterprise Agent in Catalyst 9300 and 9400 Switches. Readers might now be interested in turning on this capability on existing switches and this blog will explain how. There are two options for deploying ThousandEyes Enterprise Agent in C9K Switches. The…

Read More

How Kubernetes works under the hood with Docker Desktop – Docker Blog

How Kubernetes works under the hood with Docker Desktop – Docker Blog

Docker Desktop makes developing applications for Kubernetes easy. It provides a smooth Kubernetes setup experience by hiding the complexity of the installation and wiring with the host. Developers can focus entirely on their work rather than dealing with the Kubernetes setup details.  This blog post covers development use cases and what happens under the hood for each one of them. We analyze how Kubernetes is set up to facilitate the deployment of applications, whether they…

Read More

Survey aims to uncover the state of security convergence

Survey aims to uncover the state of security convergence

Survey aims to uncover the state of security convergence | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Nearly All Cybersecurity Companies Expose AWS Assets – Report

Nearly All Cybersecurity Companies Expose AWS Assets – Report

Some 97% of multinational cybersecurity vendors have exposed assets in their AWS environments, many of them classed as high severity issues, according to Reposify. The US startup used its scanning technology to analyze the cloud environments of a sample of 35 vendors and over 350 subsidiaries. During a two-week window in January, Reposify’s external attack surface management (EASM) platform discovered 200,000 exposed cloud assets. Over two-fifths (42%) of these were identified as high severity issues –…

Read More
1 3,192 3,193 3,194 3,195 3,196 4,073