Paving the way: Inspiring Women in Payments – A Q&A featuring Sherri Collis

Paving the way: Inspiring Women in Payments – A Q&A featuring Sherri Collis

  Sherri Collis spent most of her career as the lone female in the conference room, occupying roles more regularly filled by men. She was overlooked for training opportunities. She was passed up for promotions. But these experiences only fueled her drive to achieve success. In this edition of our blog, Sherri explains that, contrary to popular belief, women do not need to have 100% of the qualifications to do the job and still be…

Read More

NIST Publishes Ransomware Guidance

NIST Publishes Ransomware Guidance

The National Institute of Standards and Technology (NIST) has published new draft guidance for organizations concerning ransomware attacks.  The Cybersecurity Framework Profile for Ransomware Risk Management features advice on how to defend against the malware, what to do in the event of an attack, and how to recover from it.  NIST’s Ransomware Profile can be used by organizations that have already adopted the NIST Cybersecurity Framework and wish to improve their risk postures. It can also help…

Read More

Anomali Cyber Watch:  Klingon RAT Holding on for Dear Life, CVS Medical Records Breach, Black Kingdom Ransomware and More

Anomali Cyber Watch:  Klingon RAT Holding on for Dear Life, CVS Medical Records Breach, Black Kingdom Ransomware and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: Black Kingdom, Darkside, Go, Klingon Rat, Microsoft PowerApps, Ransomware and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed….

Read More

SEC Probes SolarWinds Breach Disclosure Failures

SEC Probes SolarWinds Breach Disclosure Failures

The United States Securities and Exchange Commission (SEC) has launched a probe to determine whether some companies failed to disclose that they had been impacted by the 2020 hacking attack that compromised the SolarWinds Orion software supply chain. The assault on SolarWinds was discovered and disclosed by researchers at FireEye in December. The advanced persistent threat (APT) group behind the attack was able to compromise nine government agencies, critical infrastructure, and hundreds of private-sector organizations. Last month, SolarWinds CEO…

Read More

How a Business Email Compromise attack can threaten your organization

How a Business Email Compromise attack can threaten your organization

The most common type of BEC campaign involves a spoofed email account or website, according to GreatHorn. Image: iStock/OrnRin Email is one of the most popular tools exploited by cybercriminals to launch attacks against organizations. It’s quick and simple and it relies on social engineering to trick the recipient into falling for whatever scam is in play. One particular tactic favored by criminals is the Business Email Compromise (BEC) in which the scammer spoofs a…

Read More

Accelerate and Differentiate with Hybrid Cloud – Cisco Blogs

Accelerate and Differentiate with Hybrid Cloud – Cisco Blogs

Coming off an amazing Cisco Future Cloud launch, we have now redefined and elevated the scope of opportunity for our Partners. Now what has changed? Well, the last 18 months have made a few things crystal clear… Work is no longer a place you go to but something you can do from anywhere Some may never return to the office and be permanently remote Having a digital business presence has clearly shifted from important to…

Read More

People Behind CSR at Cisco: How Inclusive Communities contribute to a Conscious Culture – Cisco Blogs

People Behind CSR at Cisco: How Inclusive Communities contribute to a Conscious Culture – Cisco Blogs

We have created a new blog series that will focus on the people behind Corporate Social Responsibility (CSR) at Cisco. Each blog in this series will highlight a different Cisco employee who works closely with CSR initiatives across the company. At Cisco, we have 29 employee resource organizations (EROs) and networks that are part of what we call our “Inclusive Communities.” These employee groups support full-spectrum diversity and foster Cisco‘s Conscious Culture globally by providing opportunities for proximity, learning, and community…

Read More

Analyzing SonicWall’s Unsuccessful Fix for CVE-2020-5135

Analyzing SonicWall’s Unsuccessful Fix for CVE-2020-5135

Back in September 2020, I configured a SonicWall network security appliance to act as a VPN gateway between physical devices in my home lab and cloud resources on my Azure account. As I usually do with new devices on my network, I did some cursory security analysis of the product and it didn’t take long before I had identified what looked like a buffer overflow in response to an unauthenticated HTTP request. I quickly reported…

Read More

ISTELive 2021: Know Before You Go – Cisco Blogs

ISTELive 2021: Know Before You Go – Cisco Blogs

This June 26th-30th, I can’t wait to connect with thousands of educators, administrators, technologists, and students to work together to design a new learning landscape. ISTELive 2021 offers us an exciting opportunity to gather for a week of learning, discussing, and problem solving. Not to mention, comradery: a chance to celebrate how we’ve made it through this wild last year, and to dream big for the future. At Cisco, we’re dedicated to helping you grow…

Read More

Splunk launches security products and AWS security enhancements

Splunk launches security products and AWS security enhancements

The new offerings are aimed at integrating security data across multiple on-prem and cloud environments and vendors to improve cybersecurity decision-making, the company says. Image: Mackenzie Burke Data analytics and cybersecurity platform provider Splunk announced Tuesday Splunk Security Cloud, a cloud-based security operations platform that integrates analytics, automated security operations and threat intelligence.  “At Splunk, we believe security is a data problem and data drives better decisions, providing the foundation for security analytics,” Sendur Sellakumar,…

Read More
1 3,309 3,310 3,311 3,312 3,313 3,592