Combatting security threats to our nation’s critical water infrastructure

Combatting security threats to our nation’s critical water infrastructure

Combatting security threats to our nation’s critical water infrastructure This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Cisco: Networking, security, collaboration at heart of hybrid workforce concerns

Cisco: Networking, security, collaboration at heart of hybrid workforce concerns

When it comes to supporting the emerging hybrid workforce, getting the network and security right is top of mind among enterprise IT leaders. That’s one finding detailed in Cisco’s new Hybrid Work Index, which the company says will be updated quarterly to gauge how worker and technology habits are evolving as the COVID-19 pandemic continues. Cisco says the index gleans information from anonymized customer data points culled from a number of its products, including Meraki…

Read More

Container Technology Energizes Edge Computing

Container Technology Energizes Edge Computing

The security, portability, and agility of container technology complement the proven capabilities of the leading real-time operating system (RTOS), VxWorks®, now available for containerized deployments at the intelligent edge. As the complexity of applications and their supporting infrastructures create new potential attack vectors for increasingly sophisticated hackers to exploit, containers in embedded systems offer a means to deliver responsive, secure application delivery to the intelligent edge. With these capabilities, aerospace and defense organizations, energy providers,…

Read More

PTP serviceability – time is money! – Cisco Blogs

PTP serviceability – time is money! – Cisco Blogs

“Time is money!” A quote that can’t be truer and more crucial for modern industrial networks where timing, precision, and synchronization pave the way for fast-paced current and future services. And in the middle of it all, PTP (Precision Timing Protocol) serves as one of the critical timing protocols making it all possible. It may be logical to think that protecting time, services, and revenue is the goal of building a resilient and secure infrastructure….

Read More

Cybersecurity Month: Be Cyber Smart

Cybersecurity Month: Be Cyber Smart

As an  Official Champion of National Cyber Security Awareness Month (NCSAM), the Council will be sharing educational resources on payment security best practices on the PCI Perspectives blog, and through our Twitter (@PCISSC) and LinkedIn pages. The Council will align these resources with the four weekly themes outlined by the National Cyber Security Alliance:

Read More

Smishing on the Rise

Smishing on the Rise

A new financial crime report by risk management tool developer Feedzai has found an increase in phishing scams perpetrated via text message, a practice known as smishing. The report analyzed over 1.5 billion global transactions completed in the second quarter of 2021 to paint a picture of the state of financial crime, consumer spending habits, and the top fraud trends. Purchase scams, where consumers pay for products or services that never arrive, topped the list of fraud scams, followed by…

Read More

A holistic approach to vulnerability management solidifies cyberdefenses

A holistic approach to vulnerability management solidifies cyberdefenses

Vulnerability scanners are not enough, according to an expert who champions an all-encompassing holistic approach to vulnerability management as a means to eliminate surprises. Image: Shutterstock/Sergey Nivens Cybercriminals have several options when it comes to plying their trade. Currently, ransomware and phishing appear to be the most popular methods. As a result, those responsible for a company’s cybersecurity are focusing on solidifying defenses against ransomware and phishing—and overlooking the fact that most cyberattacks rely on…

Read More

ExtraHop adds new threat hunting and network advisory services to Reveal(x) 360 NDR

ExtraHop adds new threat hunting and network advisory services to Reveal(x) 360 NDR

The addition of Reveal(x) Advisor services to the Reveal(x) 360 network detection and response tools helps organizations proactively manage cybersecurity hygiene and accelerate incident response. Image: Shutterstock/Dragon Images ExtraHop announced Tuesday expanded Reveal(x) Advisor services to include threat detection and threat hunting services as well as network assurance analysis. In beta mode earlier this year, the service is now available to all customers. Reveal(x) Advisor is not a stand alone service. It works alongside ExtraHop’s…

Read More

Patching Too Tortuous for IT Pros

Patching Too Tortuous for IT Pros

Patching vulnerabilities is too labor intensive and convoluted a process for most IT security professionals, according to new research by Ivanti.  The Utah-based software company surveyed over 500 enterprise IT and security professionals across North America, Europe, the Middle East, and Africa about their patch management challenges.  Nearly three-quarters of respondents (71%) found patching to be “overly complex, cumbersome, and time consuming,” with more than half (54%) saying that remote work has increased the intricacy and scale of…

Read More

UK newspaper The Telegraph exposed a 10TB database with subscriber data

UK newspaper The Telegraph exposed a 10TB database with subscriber data

The UK media outlet The Telegraph has leaked 10 TB of subscriber data after failing to properly secure one of its databases. The UK newspaper The Telegraph’, one of the UK’s largest newspapers and online media outlets, has leaked 10 TB of data after failing to properly secure one of its databases. The popular researcher Bob Diachenko discovered an unprotected 10 TB database belonging to the UK newspaper The Telegraph. The unsecured database was discovered…

Read More
1 3,248 3,249 3,250 3,251 3,252 3,769