Gig workers are here to stay, but they might pose a hidden cybersecurity risk

Gig workers are here to stay, but they might pose a hidden cybersecurity risk

Whether intentional or not, gig workers can cause security breaches. Here’s how to set your company up for safety. TechRepublic’s Karen Roby spoke with James Christiansen, VP and CSO of Netskope, about cybersecurity concerns with the gig workforce. The following is an edited transcript of their conversation. Karen Roby: We talk about the gig workforce. We’re seeing so many people working in such a different way now. The problem with that is cybersecurity becomes a…

Read More

Vitra & Cisco – Space Meets Technology – Cisco Blogs

Vitra & Cisco – Space Meets Technology – Cisco Blogs

The future of work is associated with a certain degree of uncertainty, which causes uncertainty for many, as many processes and thus also their own work have to be adapted. Thanks to new technologies, “working from anywhere, anytime” is possible today. Instead of just reacting to these changes, it is important to use this development and actively help shape it. Both our work and its processes need to be rethought. Space & Technology as “Work Enablers” Modern work…

Read More

Bringing “docker scan” to Linux – Docker Blog

Bringing “docker scan” to Linux – Docker Blog

At the end of last year we launched vulnerability scanning options as part of the Docker platform. We worked together with our partner Snyk to include security testing options along multiple points of your inner loop.  We incorporated scanning options into the Hub, so that you can configure your repositories to automatically scan all the pushed images. We also added a scanning command to the Docker CLI on Docker Desktop for Mac and Windows, so…

Read More

Probe into Leak of Cuomo Accuser’s Personnel File

Probe into Leak of Cuomo Accuser’s Personnel File

An investigation has been launched to determine whether New York governor Andrew Cuomo broke the law by allegedly leaking the personnel file of the first of eleven women to accuse him of sexual harassment.  Cuomo’s former aide Lindsey Boylan first accused him of sexual harassment in December on Twitter. In February, Boylan shared details of the alleged harassment, claiming that Cuomo had compared her to one of his former girlfriends, asked her to play strip poker with him,…

Read More

Why it’s time to figure out how to keep personal information private, yet useful

Why it’s time to figure out how to keep personal information private, yet useful

One expert suggests ways to reach a happy medium between those who give up sensitive personal information and the organizations that use it. Image: Anawat Sudchanham/EyeEm/Getty Images It might be time to take a long hard look at who gets our personal data according to Ina Miranda, CTO and co-CEO of Treasure.cloud. In the introduction to her Help Net Security article: The obvious and not-so-obvious data you wouldn’t want companies to have, Miranda asks an important…

Read More

Nebraska Medicine Data Breach Settlement Approved

Nebraska Medicine Data Breach Settlement Approved

A preliminary settlement has been reached in a lawsuit brought against Nebraska Medicine over a 2020 data security incident.  Omaha-based Nebraska Medicine suffered a cyber-attack in September 2020. The attack disrupted the healthcare provider’s information technology system, leading to the postponement of patient appointments.  Staff in the system’s hospitals and clinics had to chart by hand, and access to Nebraska Medicine’s patient portal and to patients’ electronic health records was impacted.  An investigation into the incident revealed that an unauthorized party…

Read More

StayHackFree – Your Kid’s Sports Team

StayHackFree – Your Kid’s Sports Team

Your Kids Sports team is better managed than your Cyber Team. By James Gorman, CISO, Authx Your Kid’s Hockey team has better management than your Cyber Security team.  Really, I am not kidding.  How do I know?  Let’s start with – your kid’s team has a coach, a plan, a practice schedule, and goals.   Can you honestly say that about your Cyber Security team? Your kid’s hockey team has a coach – who has some…

Read More

Pennsylvanian Charged over Trump Impersonation Fraud

Pennsylvanian Charged over Trump Impersonation Fraud

A food delivery driver from Pennsylvania has been charged with impersonating former president Donald Trump to defraud social media users.  Joshua Hall, of Mechanicsburg, was arrested on Tuesday morning and charged with wire fraud and aggravated identity theft. Prosecutors allege that the 22-year-old defrauded hundreds of people from across the United States in a year-long fundraising scam that he devised and executed alone.  Hall is accused of posing as a former president and as members…

Read More

A Cisco IoT solution using edge intelligence use case

A Cisco IoT solution using edge intelligence use case

A Cisco IoT solution using edge intelligence goes to the open sea Much like a virus, IoT sensors have been multiplying and spreading into the deepest corners of our industrial, domestic, and public environments. At the same time, we want to get insights into the data they collect in a centralized, consolidated and intuitive way. How do we accommodate those two extremes? And how can Cisco play a role in that effort? We left the…

Read More
1 3,329 3,330 3,331 3,332 3,333 3,584