Q&A on the Optional P2PE Solution Inventory Template

Q&A on the Optional P2PE Solution Inventory Template

  Point-to-Point Encryption (P2PE) technology makes data unreadable so it has no value to criminals even if stolen in a breach. Merchants can take advantage of this technology with a P2PE solution, a combination of secure devices, applications, and processes that encrypt payment card data from the point it is used at a payment terminal until it reaches a secure point of decryption. PCI P2PE Solutions are those that have been validated as meeting the…

Read More

Data Breach at New England’s Largest Energy Provider

Data Breach at New England’s Largest Energy Provider

A misconfiguration error has exposed personal data belonging to customers of New England’s largest energy provider. On March 16, Eversource discovered that one of its cloud data storage folders had erroneously been set to open access rather than to restricted access.  The company serves more than 3.6 million electric and natural gas customers in Connecticut, Massachusetts, and New Hampshire. An investigation into the data breach launched by Eversource’s security team found that the unsecured folder…

Read More

TikTok Sued Over Use of Minors’ Data

TikTok Sued Over Use of Minors’ Data

Video-sharing social networking service TikTok is being sued for billions of dollars over its alleged mishandling of children’s data.  TikTok, which is owned by Chinese company ByteDance, has more than 800 million users worldwide. Internal company data from July 2020 reported by the New York Times showed 18 million TikTok users were aged 14 years or younger. The claim against the company has been filed by Anne Longfield, children’s commissioner for England, on behalf of the millions of minors in…

Read More

Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously | McAfee Blogs

Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously | McAfee Blogs

In the working world, there’s a chance you’ve come across your fair share of team-building exercises and workshops. There’s one exercise that comes to mind that often results in worried, and uneasy faces during these seminars: The Trust Fall. This is where you fall backward with the expectation that your colleague will catch you before you hit the ground.    Whether you have been with an organization for many years or just started, the same “pit in stomach” feeling reverberates across bellies as…

Read More

Downloading an app for virtual care? No need. Webex Telehealth Connect for Epic. – Cisco Blogs

Downloading an app for virtual care? No need. Webex Telehealth Connect for Epic. – Cisco Blogs

“Cisco in Healthcare? Don’t you just sell switches and routers?” When I talk to clinicians, this is often a question they ask. And we welcome the conversation because it means we can stop talking bits, bytes, speeds and feeds and really dive into how technology is transforming patient care. We can talk about how Webex, voice, video, contact center, wireless and mobility technologies have transformed every clinician’s experience.  We can talk about how Cisco has…

Read More

Lessons We Can Learn From Airport Security | McAfee Blogs

Lessons We Can Learn From Airport Security | McAfee Blogs

Most of us don’t have responsibility for airports, but thinking about airport security can teach us lessons about how we consider, design and execute IT security in our enterprise. Airports have to be constantly vigilant from a multitude of threats; terrorists, criminals, rogue employees and their security defenses need to combat major attacks, individual threats, stowaways, smuggling as well as considering the safety of passengers and none of this can stop the smooth flow of…

Read More

Cisco at Red Hat Summit 2021 – Cisco Blogs

Cisco at Red Hat Summit 2021 – Cisco Blogs

Mark your calendar! Register now for Cisco at Red Hat Summit 2021 on April 27-28 and June 15-16, 2021. In the next week, we are participating (virtually) at Red Hat Summit 2021 as a gold sponsor. We are excited to showcase how our partnership with Red Hat is continuously evolving and how Cisco is helping customers modernize their data center and applications with simplified infrastructure. Cisco and Red Hat are market leaders offering best in class…

Read More

The Need for Continuous and Dynamic Threat Modeling – Cisco Blogs

The Need for Continuous and Dynamic Threat Modeling – Cisco Blogs

This blog is co-authored by Mohammad Iqbal and is part four of a four-part series about DevSecOps. The trend towards accelerated application development, and regular updates to an architecture through an agile methodology, reduces the efficacy and effectiveness of point-in-time threat modeling. This recognition led us to explore and strategize ways to continuously, and dynamically, threat model an application architecture during runtime. Today, thanks to a robust DevOps environment, developers can deploy a complex architecture…

Read More

Rapid7 Acquires Open Source Monitoring Platform Velociraptor

Rapid7 Acquires Open Source Monitoring Platform Velociraptor

Rapid7 has announced the acquisition of open source software technology and community Velociraptor. The move will enable Rapid7 to enhance its incident response capabilities by leveraging Velociraptor’s open source platform, which is used for endpoint monitoring, digital forensics and incident response. Velociraptor was developed to help digital forensics and incident response (DFIR) professionals to discover and monitor malicious activities. The platform’s community style also allows DFIR pros to share their insights with one another. It’s…

Read More

Beware of BRATA: How to Avoid Android Malware Attack | McAfee Blogs

Beware of BRATA: How to Avoid Android Malware Attack | McAfee Blogs

Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are relying on a tactic called social engineering, where they capitalize upon fear and urgency to manipulate unsuspecting device users to hand over their passwords, banking information, or other critical credentials.  One evolving mobile device threat that combines malware and social engineering tactics is called BRATA. BRATA has been recently upgraded by its malicious creators and several strains have already been downloaded thousands of times, according to a McAfee Mobile Research Team report.  …

Read More
1 3,419 3,420 3,421 3,422 3,423 3,554