Doug Lucktaylor named Head of Information Security at CSS Assure

Doug Lucktaylor named Head of Information Security at CSS Assure

Doug Lucktaylor named Head of Information Security at CSS Assure | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Lenovo expands edge computing portfolio with AI-focused Nvidia GPUs

Lenovo expands edge computing portfolio with AI-focused Nvidia GPUs

Lenovo’s latest addition to the ThinkEdge portfolio of edge-computing devices packs Nvidia GPUs with AI capabilities into a ruggedized design that’s roughly the size of a laptop. The ThinkEdge SE450 is a 2U, 300mm (12 inches) unit that includes a third-generation Xeon Platinum processor and up to four single-width or two double-width GPUs, along with six NVMe SSDs and 1TB of DDR4 memory, making it one of the first Nvidia-certified Edge systems. There is also…

Read More

Former Inspector General Pleads Guilty to Software Theft

Former Inspector General Pleads Guilty to Software Theft

A former acting inspector general for the US Department of Homeland Security (DHS) has pleaded guilty to charges related to his theft of federal government software and databases. Charles Edwards, 61, of Sandy Spring, Maryland, worked for the DHS Office of Inspector General (DHS-OIG) from 2008-2013, and before that at the US Postal Service Office of Inspector General (USPS-OIG). At both organizations, he’s said to have had access to case management software and other systems…

Read More

Unlikely partners: How CIOs and CMOs can collaborate

Unlikely partners: How CIOs and CMOs can collaborate

It’s a C-suite pairing some might not think of as being necessarily strategic: the CIO and CMO. IT leaders are often linked to finance, operations, and other senior executives. But with marketing technology carving out its own important role in the enterprise, this particular corporate relationship can have significant benefits for organizations. In an October 2021 report, Forrester Research notes that there are new opportunities emerging for CMOs and CIOs to align their teams to…

Read More

10 CIO resolutions for 2022

10 CIO resolutions for 2022

As we begin 2022, it’s time to think about your resolutions as a CIO that will help you take the next step forward. Rather than a list of known programs, projects, products to implement across IT and the business, or staples such as improving the organization’s cybersecurity posture, consider this your personal development list for 2022. Choose the ideas that resonate the most with you and that will advance your most important goals. Implement your…

Read More

Two Years for Romance Fraudster Who Targeted Hundreds of Women

Two Years for Romance Fraudster Who Targeted Hundreds of Women

A romance scammer who targeted hundreds of women and persuaded some to give him thousands of pounds has been jailed for over two years. Osagie Aigbonohan, 41, from Lagos, Nigeria, operated under the moniker “Tony Eden” from his flat in Abbey Wood, London. He’s said to have targeted nearly 700 women, including one who was terminally ill and whom he continued to pursue even after she passed away. Police who searched his property also found footwear…

Read More

Microsoft Warns of Destructive Malware Campaign Targeting Ukraine

Microsoft Warns of Destructive Malware Campaign Targeting Ukraine

Microsoft has detected a major malware wiper campaign targeting government, IT and non-profit organizations across Ukraine. Dubbed “WhisperGate,” the attacks were first spotted on January 13, at around the same time that over a dozen government websites were forced offline in what was described as a “massive” cyber-attack. Although Microsoft said it had not noticed any links between the destructive malware campaign, tracked as DEV-0586, and previous known activity groups, it comes at a time of heightened…

Read More

Microsoft Successfully Defended The Azure Cloud From A Massive DDOS Attack. (Spoiler: You Can, Too.)

Microsoft Successfully Defended The Azure Cloud From A Massive DDOS Attack. (Spoiler: You Can, Too.)

How can you fend off the largest DDoS attack in history? For Microsoft, early detection and investing in software as a service was key. Read on to learn more. By Jason Barr, Senior Director of Innovation, Core BTS Last month, European Azure Cloud users faced the largest Distributed Denial-of-Service (DDoS) attack in history. Yet, it was business as usual for Azure Cloud customers — all thanks to Microsoft’s well thought out security protections. For years,…

Read More

Five critical steps to ensure ESM success

Five critical steps to ensure ESM success

Enterprise service management (ESM) takes the principles developed by IT teams in their service management activities and applies them across enterprise business functions. The goal is to improve the quality of service delivered both internally and externally by creating processes and systems that support the organisation’s service delivery goals. In today’s world, companies can no longer be certain about where their customers and employees are and how they interact. The shift from most staff working…

Read More

10 cognitive biases that can derail cybersecurity programs

10 cognitive biases that can derail cybersecurity programs

10 cognitive biases that can derail cybersecurity programs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 3,251 3,252 3,253 3,254 3,255 4,005