Nominate the Most Influential People in Security

Nominate the Most Influential People in Security

Nominate the Most Influential People in Security | 2021-04-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Getting it Right – The Hidden Benefits of Compliance

Getting it Right – The Hidden Benefits of Compliance

If I were to ask you why you scanned for compliance at your company, I’d bet you’d tell me it was to help you pass requirements easier, to ensure that your audits are good on the first pass and so that you could troubleshoot technical issues with another process. You didn’t know about that last one? Wait, are you telling me you don’t know about the hidden benefits of compliance that you’re getting? Let’s talk….

Read More

Episode 2: You’re New to CIAM – Now What?

Episode 2: You’re New to CIAM – Now What?

So you’ve got a basic understanding of customer identity and access management (CIAM) and why it’s so important. Now it’s time to determine where you fall on Okta’s CIAM Maturity Curve and how to use that assessment to your advantage. In this second episode of our 5-episode podcast, The C-level Strategic Guide for CIAM Investment, we explore the first level on the CIAM Maturity Curve: basic. At this phase you’ve built critical identity security features…

Read More

802.1X: What you need to know about this LAN-authentication standard

802.1X: What you need to know about this LAN-authentication standard

When devics on enterprise LANs need to connect to other devices, they need a standard method for identifying each other to ensure they are communicating with the device they want to, and that’s what 802.1x does. This article tells where it came from and how it works. 802.1x defined IEEE 802.1X is a standard that defines how to provide authentication for devices that connect with other devices on local area networks (LANs). It provides a…

Read More

Red Hat announces Red Hat Edge initiative

Red Hat announces Red Hat Edge initiative

During this week’s Red Hat Summit, the company announced enhanced support for edge networking in its upcoming RHEL 8.4 release. The Red Hat Edge initiative promises new capabilities that will make RHEL a more powerful foundation for the open hybrid cloud. The Red Hat Edge aims to extend Red Hat’s open hybrid cloud portfolio to the edge. This will involve everything from telecommunications and transportation to smart automobiles and enterprise devices. With Red Hat technologies,…

Read More

Boffins found a bug in Apple AirDrop that could leak users’ personal info

Boffins found a bug in Apple AirDrop that could leak users’ personal info

Experts found a bug in Apple’s wireless file-sharing protocol Apple AirDrop that could expose user’s contact information. Boffins from the Technical University of Darmstadt, Germany, have discovered a privacy issue in Apple’s wireless file-sharing protocol Apple AirDrop that could expose user’s contact information, such as email addresses and phone numbers. “A team of researchers from the Secure Mobile Networking Lab (SEEMOO) and the Cryptography and Privacy Engineering Group (ENCRYPTO) at TU Darmstadt took a closer look at this mechanism…

Read More

Apple’s macOS 11.3 fixes a zero-day exploit and includes M1 improvements

Apple’s macOS 11.3 fixes a zero-day exploit and includes M1 improvements

The latest update to Apple’s Big Sur includes critical security patches, which is why Cory Bohon advises upgrading your macOS devices now. Image: Screenshot by Stephen Shankland/CNET Apple released macOS 11.3 on April 26, 2021 to the public. The 11.3 update to Big Sur is available to all compatible systems.  This update includes a serious security update that fixes a zero-day exploit related to the File Quarantine and GateKeeper system in macOS. The security update…

Read More

Learn Network Automation with Cisco DNA Center SDK

Learn Network Automation with Cisco DNA Center SDK

For the past couple months I have been working on the next installment (among some other exciting things) of the DNAC automation journey. As you’ve seen in Part 1 and Part 2 of this series, it is super simple to get started with the Cisco DNA Center Python SDK and build your first automation use case. I’ve been asked about this use case numerous times from our awesome DevNet Community, so thought I’d cover it…

Read More

Ransomware attack hits Washington, D.C. police department

Ransomware attack hits Washington, D.C. police department

The attack was reportedly pulled off by the Babuk gang, which has already leaked screenshots of some of the stolen data. vchal, Getty Images/iStockphoto Another government agency has found itself the victim of a ransomware attack, and this time it’s Washington, D.C.’s own police department. Serving the nation’s capital, the Metropolitan Police Department (MPD) has acknowledged unauthorized access on its server, an attack for which the Babuk Locker gang has claimed responsibility, according to BleepingComputer…

Read More

US Arrests Alleged Crypto Mixer

US Arrests Alleged Crypto Mixer

Law enforcement officers in the United States have arrested a man on suspicion of laundering hundreds of millions of dollars’ worth of Bitcoin (BTC) through a cryptocurrency mixing service. A crypto-mixing service—also known as a cryptocurrency tumbler—obscures the original source of potentially identifiable or “tainted” cryptocurrency by jumbling it up with other funds in a single pool.  An arrest warrant for Roman Sterlingov was successfully executed in Los Angeles, California, on April 27 and filed in the United…

Read More
1 3,405 3,406 3,407 3,408 3,409 3,557