NatWest Pleads Guilty in £400m Money Laundering Case

NatWest Pleads Guilty in £400m Money Laundering Case

A leading UK high street bank has pleaded guilty to failing to stop a massive money-laundering operation carried out by a business customer. Criminal charges were brought against NatWest by regulator the Financial Conduct Authority (FCA) under the UK’s Money Laundering Regulations 2007. The lender, which is state-backed, entered a guilty plea at Westminster Magistrates Court in the first case of its kind. It covers four years between November 2012 and June 2016, during which the bank…

Read More

UK Firms Hit by One Attack Every 47 Seconds Over Summer

UK Firms Hit by One Attack Every 47 Seconds Over Summer

Cyber-attacks targeting UK firms are back on the increase, reaching a rate of one every 47 seconds over the summer, according to new data from Beaming. The business ISP had noted a 9% year-on-year drop in the second quarter, but it now appears that was a temporary blip. Attacks increased 4% between July and September over the same period last year. The firm claimed that this amounts to an average of 168,975 attacks per company in…

Read More

VMware Marketplace launches third-party commerce capability

VMware Marketplace launches third-party commerce capability

VMware users can now purchase third-party partner solutions from the VMware Marketplace and deploy these solutions directly to VMware endpoints. Plus, we are delighted to announce a host of upcoming VMware Marketplace portfolio capabilities and services that will accelerate our customers’ cloud adoption journeys and our partners’ go-to-market strategies with VMware. Recent innovations in digitization have had deep impacts in almost every aspect of our life, from food and healthcare to personal finance and manufacturing….

Read More

Combatting security threats to our nation’s critical water infrastructure

Combatting security threats to our nation’s critical water infrastructure

Combatting security threats to our nation’s critical water infrastructure This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Cisco: Networking, security, collaboration at heart of hybrid workforce concerns

Cisco: Networking, security, collaboration at heart of hybrid workforce concerns

When it comes to supporting the emerging hybrid workforce, getting the network and security right is top of mind among enterprise IT leaders. That’s one finding detailed in Cisco’s new Hybrid Work Index, which the company says will be updated quarterly to gauge how worker and technology habits are evolving as the COVID-19 pandemic continues. Cisco says the index gleans information from anonymized customer data points culled from a number of its products, including Meraki…

Read More

Container Technology Energizes Edge Computing

Container Technology Energizes Edge Computing

The security, portability, and agility of container technology complement the proven capabilities of the leading real-time operating system (RTOS), VxWorks®, now available for containerized deployments at the intelligent edge. As the complexity of applications and their supporting infrastructures create new potential attack vectors for increasingly sophisticated hackers to exploit, containers in embedded systems offer a means to deliver responsive, secure application delivery to the intelligent edge. With these capabilities, aerospace and defense organizations, energy providers,…

Read More

PTP serviceability – time is money! – Cisco Blogs

PTP serviceability – time is money! – Cisco Blogs

“Time is money!” A quote that can’t be truer and more crucial for modern industrial networks where timing, precision, and synchronization pave the way for fast-paced current and future services. And in the middle of it all, PTP (Precision Timing Protocol) serves as one of the critical timing protocols making it all possible. It may be logical to think that protecting time, services, and revenue is the goal of building a resilient and secure infrastructure….

Read More

Cybersecurity Month: Be Cyber Smart

Cybersecurity Month: Be Cyber Smart

As an  Official Champion of National Cyber Security Awareness Month (NCSAM), the Council will be sharing educational resources on payment security best practices on the PCI Perspectives blog, and through our Twitter (@PCISSC) and LinkedIn pages. The Council will align these resources with the four weekly themes outlined by the National Cyber Security Alliance:

Read More

Smishing on the Rise

Smishing on the Rise

A new financial crime report by risk management tool developer Feedzai has found an increase in phishing scams perpetrated via text message, a practice known as smishing. The report analyzed over 1.5 billion global transactions completed in the second quarter of 2021 to paint a picture of the state of financial crime, consumer spending habits, and the top fraud trends. Purchase scams, where consumers pay for products or services that never arrive, topped the list of fraud scams, followed by…

Read More

A holistic approach to vulnerability management solidifies cyberdefenses

A holistic approach to vulnerability management solidifies cyberdefenses

Vulnerability scanners are not enough, according to an expert who champions an all-encompassing holistic approach to vulnerability management as a means to eliminate surprises. Image: Shutterstock/Sergey Nivens Cybercriminals have several options when it comes to plying their trade. Currently, ransomware and phishing appear to be the most popular methods. As a result, those responsible for a company’s cybersecurity are focusing on solidifying defenses against ransomware and phishing—and overlooking the fact that most cyberattacks rely on…

Read More
1 3,420 3,421 3,422 3,423 3,424 3,942