CIS Control 07: Continuous Vulnerability Management

CIS Control 07: Continuous Vulnerability Management

When it comes to cybersecurity, vulnerability management is one of the older technologies that still play a critical role in securing our assets. It is often overlooked, disregarded, or considered only for checkbox compliance needs, but a proper vulnerability management program can play a critical role in avoiding a series data breach. CIS Control 07 provides the minimum requirements, table stakes if you will, for establishing a successful vulnerability management program. Key Takeaways for Control…

Read More

CIS Control 07: Continuous Vulnerability Management

CIS Control 07: Continuous Vulnerability Management

When it comes to cybersecurity, vulnerability management is one of the older technologies that still play a critical role in securing our assets. It is often overlooked, disregarded, or considered only for checkbox compliance needs, but a proper vulnerability management program can play a critical role in avoiding a series data breach. CIS Control 07 provides the minimum requirements, table stakes if you will, for establishing a successful vulnerability management program. Key Takeaways for Control…

Read More

Does your company have a cybersecurity strategy? Is it any good?

Does your company have a cybersecurity strategy? Is it any good?

Take this quick, multiple choice survey and tell us about your company’s cybersecurity strategies for the upcoming year. October isn’t just known for Halloween and pumpkin-spiced beverages. It’s also Cybersecurity Awareness Month. There’s no better time than the present to either update or learn about your company’s cybersecurity strategy.  Has COVID-19 affected your organization’s cybersecurity plans? What supply chain cybersecurity measures has your company implemented or will implement in the next 12 months? We want…

Read More

VMworld 2021: VMware to pack more security into NSX

VMworld 2021: VMware to pack more security into NSX

When it comes to protecting data-center-based resources in the highly distributed world, traditional security hardware and software components just aren’t going to cut it. That’s the bottom line for enterprises as they move to distributed digital environments according to Tom Gillis, senior vice president and general manager of VMware’s networking & advanced security business group. The idea is that security needs to be put deep into the infrastructure fabric and protect workloads across their lifecycle,…

Read More

Choosing Better DCIM Tools for Edge Computing and other Distributed, Hybrid IT Environments

Choosing Better DCIM Tools for Edge Computing and other Distributed, Hybrid IT Environments

I think it’s safe to say that most businesses that used to own and operate centralized data centers now have physical IT infrastructure assets widely distributed on premise, at colocation providers, and increasingly at the edge of the network. One study had determined that while only 10% of enterprise data was created outside of core centralized data centers in 2018, estimates for 2025 suggest up to 75% will be generated and handled by edge computing sites [1]….

Read More

America Urged to Prepare for Shift to Post-Quantum Cryptography

America Urged to Prepare for Shift to Post-Quantum Cryptography

The Department of Homeland Security (DHS) has teamed up with the Department of Commerce’s National Institute of Standards and Technology (NIST) to release a roadmap on the best way for organizations to navigate the transition to post-quantum cryptography. The guide provides relevant stakeholders with achievable steps they can take to reduce the risks related to the advancement of quantum computing technology. “While quantum computing promises unprecedented speed and power in computing, it also poses new risks.  As this technology advances over the next…

Read More

People Behind CSR at Cisco: How Meraki’s Charlie Gebhardt engages employees in volunteer and giving efforts – Cisco Blogs

People Behind CSR at Cisco: How Meraki’s Charlie Gebhardt engages employees in volunteer and giving efforts – Cisco Blogs

Cisco Meraki is a complete cloud-managed networking solution that integrates hardware, software, and cloud services. Besides its products, another distinct aspect of the Meraki business unit is that its employees are deeply engaged in community impact and volunteerism. Charlie Gebhardt is a program manager who guides business transformations for Cisco Meraki. I recently sat down with him to learn more about his inspiration to support communities, his involvement with the Meraki Gives leadership team, and…

Read More

Inside TeamTNT’s Impressive Arsenal

Inside TeamTNT’s Impressive Arsenal

Authored By: Tara Gould Key Findings Anomali Threat Research has discovered an open server to a directory listing that we attribute with high confidence to the German-speaking threat group, TeamTNT. The server contains source code, scripts, binaries, and cryptominers targeting Cloud environments. Other server contents include Amazon Web Services (AWS) Credentials stolen from TeamTNT stealers are also hosted on the server. This inside view of TeamTNT infrastructure and tools in use can help security operations…

Read More

Texan Imprisoned Over COVID-19 Hoax

Texan Imprisoned Over COVID-19 Hoax

A man from Texas has been sentenced to 15 months in federal prison after lying on social media.   San Antonio resident Christopher Charles Perez, also known as Christopher Robbins, posted two messages on Facebook in April 2020 in which he falsely claimed to have hired a person infected with COVID-19 to lick items on display at grocery stores. Perez, who is aged 40, said in the messages that goods for sale in several shops in…

Read More

Over 1.5 billion Facebook users’ personal data found for sale on hacker forum

Over 1.5 billion Facebook users’ personal data found for sale on hacker forum

Unrelated to other recent problems Facebook has had, this particular batch of data was scraped from profiles, meaning it’s publicly available knowledge. That doesn’t stop it from being dangerous. Image: Shutterstock/Ink Drop It’s been a bad few days for Facebook. An outage affected all of its sites (and Oculus products), testimony from a whistleblower this week could put the company back in the legal hotseat, and now it’s come out that private and personal data…

Read More
1 3,255 3,256 3,257 3,258 3,259 3,772