How to enable SSH 2FA on AlmaLinux for more secure logins

How to enable SSH 2FA on AlmaLinux for more secure logins

If you’ve started rolling out AlmaLinux to your data centers, you should enable 2FA for SSH authentication. Jack Wallen shows you how. Image: iStockphoto/Jirsak AlmaLinux is a drop-in replacement for CentOS that also happens to be a 1:1 binary replacement for Red Hat Enterprise Linux. Chances are pretty good you’ll be deploying this enterprise-ready Linux server distribution soon. When you do, you want to make sure it’s as secure as possible. One way to beef…

Read More

Homeland Security unveils new cybersecurity requirements for pipeline operators

Homeland Security unveils new cybersecurity requirements for pipeline operators

Owners and operators will have to identify any gaps in their security and report new incidents to key federal agencies because of the Colonial Pipeline ransomware attack. Image: Bloomberg/Getty Images In the wake of the ransomware attack against Colonial Pipeline, the Department of Homeland Security (DHS) has revealed new requirements aimed at all pipeline owners and operators in the U.S. Announced by DHS’ Transportation Security Administration (TSA) on Thursday, the security directives are designed to…

Read More

The five core components that will drive the next wave of banking innovation

The five core components that will drive the next wave of banking innovation

The growth in online banking has been – and will continue to be – rapid. From a valuation of $11.43 billion in 2019, the projections are that it will reach $31.81 billion by 2027, at a CAGR of 13.6%. For the incumbent banking system, this rapid growth poses a real and ongoing challenge, as it has opened the door to unconventional disruption and new competition. Non-banking companies are now able to bring different business models…

Read More

Scripps Health still grappling with impact of May 1 ransomware attack

Scripps Health still grappling with impact of May 1 ransomware attack

The hospital chain has been forced to reschedule operations and is working to bring its electronic health record systems back online. Getty Images/iStockphoto A May 1 ransomware attack against California hospital chain Scripps Health continues to impact both the organization and its patients almost a month later. On Monday, Scripps Health published an FAQ with new details about the attack as well as directions for affected patients. In its update, the organization acknowledged a cybersecurity…

Read More

Data Breach at Canada Post

Data Breach at Canada Post

Canada’s primary postal operator, Canada Post, confirmed Wednesday that it has suffered a data breach.  The security incident occurred following a cyber-attack on one of the Crown corporation’s suppliers, Commport Communications, which provides electronic data interchange solutions.  Commport Communications was hired by the postal service to manage the shipping manifest data of its large parcel business’ customers. Following the cyber-attack, Canada Post has informed 44 of its commercial customers that data belonging to more than 950,000 customers…

Read More

Applying DevNet Associate Skills to Real World Tasks – June webinars

Applying DevNet Associate Skills to Real World Tasks – June webinars

Nothing says summer fun like studying network automation. Am I right!?! Okay, maybe it’s not quite as much fun as amusement parks, beaches, mountain hiking, or camping, but that doesn’t mean you can’t also have fun studying for a DevNet Certification between those other activities.  And I’ll be hosting a series of FOUR webinars in June 2021 focusing on applying the skills of a DevNet Associate to real world tasks, use cases, and problems that…

Read More

Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail

Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail

By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find one overlooked weakness. Defenders, meanwhile, are often overwhelmed with alerts, unsure what to patch first and have little real visibility into the weaknesses of their ever-changing environments. In a battle between active adversaries who only need to land a single blow to win — and passive defenders…

Read More

Announcing the New Open Source Project Yor, Dynamic and Automated Cloud Infrastructure Tagging

Announcing the New Open Source Project Yor, Dynamic and Automated Cloud Infrastructure Tagging

SANTA CLARA, Calif., May 27, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced the release of Yor, an open-source tool that automatically tags cloud resources within infrastructure as code (IaC) frameworks Terraform, AWS CloudFormation, and Serverless Framework YAML. Yor automates the tedious work of manually tagging cloud resources, helps security teams trace security misconfigurations from code to cloud, and enables highly effective GitOps across all major cloud providers. “Effective…

Read More

Happy Birthday GDPR! | McAfee Blogs

Happy Birthday GDPR! | McAfee Blogs

Believe it or not, the baby turns 3 today! And like with every three-year-old, there is a lot to watch out for. Granted, when GDPR was born it was after a 2-year gestation (transition) period. What followed were many sleepless nights with the new baby when it was born on May 25, 2018; not to mention the sleepless nights in the run up to the birth. Some parents (organisations) were running around frantically trying to…

Read More

The Changing Role of IT Leadership Post-Pandemic

The Changing Role of IT Leadership Post-Pandemic

The pandemic has raised the status and prospects of IT leaders within their organizations. But, what now? How can they capitalize on successes? Which pitfalls should they avoid? These were just some of the questions recently discussed during an IDG TECHTalk Twitter chat, sponsored by Comcast. The robust forum — summarized here — was led by Isaac Sacolick (@nyike), CIO contributing editor and author of Driving Digital. Answers lightly edited for clarity. Q1: What are…

Read More
1 3,357 3,358 3,359 3,360 3,361 3,582