Swissport Ransomware Incident Delayed Flights

Swissport Ransomware Incident Delayed Flights

Airport services giant Swissport is restoring its IT systems after a ransomware attack struck late last week, delaying flights. The Zurich-headquartered firm operates everything from check-in gates and airport security to baggage handling, aircraft fuelling and de-icing and lounge hospitality. It claims to have provided ground services to 97 million passengers last year and handled over five million tons of air freight. Swissport took to Twitter on Friday to warn its IT infrastructure had been hit by…

Read More

CIOs make the leap to business leadership

CIOs make the leap to business leadership

In his time with the Worcester Red Sox, baseball IT exec Matthew Levin grew to be a valuable two-way player. As senior vice president and chief financial and technology officer, Levin wore two hats for the Triple-A affiliate of the Boston Red Sox, balancing a joint role that married his deep passions for technology, finance, and baseball — one that saw him simultaneously examining issues from a cost perspective and seeking to innovate by deploying…

Read More

Microsoft Azure Data Scientist Associate certification guide

Microsoft Azure Data Scientist Associate certification guide

Data scientists discover insights from structured and unstructured data to help organizations improve revenue, reduce costs, increase business agility, improve customer experiences, and develop new products. Data scientist teams typically seek to identify key data assets that can be turned into data pipelines that feed maintainable tools and solutions, from credit card fraud monitoring solutions used by banks to tools used to optimize the placement of wind turbines in wind farms. The data scientist role…

Read More

Crypto Firm Meter Loses $4.4m in Cyber-Heist

Crypto Firm Meter Loses .4m in Cyber-Heist

Yet another cryptocurrency firm has been hacked to the tune of millions of dollars. Meter provides decentralized finance (DeFi) infrastructure services, linking siloed blockchains for users with so-called “cross-chain bridges.” Over the weekend, it revealed that an unauthorized intruder had managed to exploit a bridge vulnerability to mint a large number of Binance Coins (BNB) and wrapped Ethereum (WETH), while running down its reserves. After halting bridge transactions immediately, the firm investigated the source of…

Read More

What’s the salary of a chief security officer?

What’s the salary of a chief security officer?

What’s the salary of a chief security officer? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

45 years tearing down siloes: Maureen Rush

45 years tearing down siloes: Maureen Rush

45 years tearing down siloes: Maureen Rush | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

What’s the salary of a CSO?

What’s the salary of a chief security officer?

What’s the salary of a CSO? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

User Created Content with Tripwire Configuration Manager

User Created Content with Tripwire Configuration Manager

Tripwire Configuration Manager allows for user created configuration and compliance management content via a new Policy Management capability. Custom user content can be used alongside existing cloud service provider and third-party SaaS policies, providing multiple new use cases for data gathering and expanding policy compliance support into new services. This blog will describe some of the features and use cases for the Policy Management capability. Configuration Manager Policy Management Configuration Manager Policy Management allows creating,…

Read More

Your Cell Phone and Your Identity: Keeping Your PII Safe

Your Cell Phone and Your Identity: Keeping Your PII Safe

Have you considered how often your phone number has been shared? Most of us give out our cell phone numbers all the time – to friends, acquaintances, colleagues, and even big, monolithic, impersonal companies. We may even print them on business cards or list them on public forums. A cell phone is no longer just a way to contact someone to engage in conversation. It is now the quickest way to reach a large portion of…

Read More

How iOS Malware May Snoop on Our Devices

How iOS Malware May Snoop on Our Devices

Smartphones have become such an integral part of our lives that it’s hard to imagine a time when we didn’t have them. We carry so much of our lives on our devices, from our social media accounts and photos of our pets to our banking information and home addresses. Whether it be just for fun or for occupational purposes, so much of our time and attention is spent on our smartphones.  Because our mobile devices…

Read More
1 3,216 3,217 3,218 3,219 3,220 4,026