One Identity Acquires OneLogin

One Identity Acquires OneLogin

Software company One Identity has acquired identity access management (IAM) solutions provider OneLogin.  News of the acquisition by the Quest Software business was announced yesterday; however, the terms of the deal were not disclosed.  One Identity said that combining OneLogin with its existing privileged access management (PAM), identity governance and administration (IGA), and active directory management and security (ADMS) solutions will allow customers “to take a holistic approach to identity security with trusted, proven technology in each major category.” Together,…

Read More

Check Out the New “Yang for NSO” Labs and Dev Center

Check Out the New “Yang for NSO” Labs and Dev Center

Automating infrastructure configuration is a big deal and can save your company tons of time and money. Cisco’s Network Service Orchestrator (NSO) automation platform solves configuration management problems, but often requires some learning investment to unlock its full potential. I am thrilled to announce some recently added resources to help you get ramped up in your automation journey with NSO. New Yang for NSO Learning Labs The designers of the Yang data modeling language created…

Read More

Join Us at SnykCon 2021! – Docker Blog

Join Us at SnykCon 2021! – Docker Blog

This week is Snyk’s annual SnykCon virtual conference that aims to connect with the global developer and security communities and Docker is excited to participate as a gold sponsor for the second year! At last year’s conference, we discussed our partnership with Snyk to incorporate their leading vulnerability scanning across the entire Docker application development lifecycle.  This partnership is just as important this year, as we’ve seen supply chain attacks happening at an alarming rate….

Read More

Anomali Cyber Watch: New APT ChamelGang, FoggyWeb, VMWare Vulnerability Exploited and More

Anomali Cyber Watch: New APT ChamelGang, FoggyWeb, VMWare Vulnerability Exploited and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, FoggyWeb, Google Chrome Bugs, Hydra Malware, NOBELIUM and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending…

Read More

CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited

CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited

The Apache HTTP Server Project patched a path traversal vulnerability introduced less than a month ago that has been exploited in the wild. Background On October 5, the Apache HTTP Server Project patched CVE-2021-41773, a path traversal and file disclosure vulnerability in Apache HTTP Server, an open-source web server for Unix and Windows that is among the most widely used web servers. According to the security advisory, CVE-2021-41773 has been exploited in the wild as…

Read More

Northern Irish Voucher Scheme Marred by Identity Snag

Northern Irish Voucher Scheme Marred by Identity Snag

A voucher scheme launched by the Northern Ireland Assembly to stimulate economic growth following Covid-19 lockdowns is having an identity crisis.  Under the £145m High Street Spend Local Scheme, the approximately 1.4 million residents of Northern Ireland who are aged 18 and over are eligible to apply for a £100 Spend Local voucher.  The voucher takes the form of a prepaid card, which is accepted by businesses across Northern Ireland. To apply for the card, residents must submit…

Read More

Flight Safety Foundation highlights need for digital health certificates

Flight Safety Foundation highlights need for digital health certificates

Flight Safety Foundation highlights need for digital health certificates This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Executive Spotlight: Q&A with Vice President, Global Commercial, Britt Norwood

Executive Spotlight: Q&A with Vice President, Global Commercial, Britt Norwood

Welcome back to our executive blog series, where I chat with some of the pivotal players behind McAfee Enterprise to hear their takes on today’s security trends, challenges, and opportunities for enterprises across the globe. Dive into the conversation below with Vice President, Global Commercial, Britt Norwood. Q: What’s the first career you dreamed of having as a kid? My first career was as a paper boy from 5th through 8th grade, but I always wanted…

Read More

Mobile security: It’s time for a little tough love for Android users

Mobile security: It’s time for a little tough love for Android users

Jack Wallen dispenses his bi-annual advice to Android users on how to avoid falling prey to malicious apps and bad actors. Image: rafapress/Shutterstock That’s right, Android users, it’s that time again. It seems every six months or so I am driven to offer up some tough love for our favorite mobile platform. Why? Because bad actors are always out there, hoping to steal your data and wreck your lives. It happens … frequently. And no…

Read More
1 3,397 3,398 3,399 3,400 3,401 3,910