Report: Chip shortage and edge/IoT will drive IT change in 2022

Report: Chip shortage and edge/IoT will drive IT change in 2022

The author of a new report from Forrester Research says that the simultaneous growth of IoT and edge computing usage are interlinked, and that future growth in both areas will be fueled heavily by federal regulations to reduce emissions. “We cannot disassociate the advancements in IoT without talking about the effect on edge,” he said. “They’re not distinct from each other..and the effect they have on use cases is combined.” The demand for “sustainability-related service,”…

Read More

US government ransomware advice to K-12 schools is “vastly outdated”

US government ransomware advice to K-12 schools is “vastly outdated”

A recently published report from the US Government Accountability Office (GAO) has warned that official security guidance from the Department of Education is out-of-date, and needs to be refreshed to address the increasing reports of ransomware and other cyber threats. According to the GAO report, the current plan for addressing threats to K-12 schools was developed and issued in 2010 and has not been updated to deal with the changing nature of cybersecurity attacks, such…

Read More

Learning What Love Can Do – Cisco Blogs

Learning What Love Can Do – Cisco Blogs

“What can love do?” It’s a bold question asked by the organizers of 1DayLA, a week-long initiative in Los Angeles (LA) that helps the city rally around beautification projects, back to school events, free medical clinics, homeless assistance, and aid distribution. Recently, I used my Cisco volunteer hours (we get 40 each year to volunteer in ways we’re most passionate) to uncover the answer and find out what love could do. This isn’t just any…

Read More

Cisco Secure Cloud Insights is your Eye in the Sky – Cisco Blogs

Cisco Secure Cloud Insights is your Eye in the Sky – Cisco Blogs

In the world of cybersecurity where information holds the keys to the kingdom, there is no shortage of data generated by numerous security tools. However, there arguably remains a lack of information. Security professionals often refer to information as ‘Actionable Intelligence’ or ‘Context’. Those engaged in the trenches of cyber warfare would appreciate a more nuanced view which states that Context is the catalyst that converts Data into Intelligence. Context helps answer important questions such…

Read More

What Makes Us Click? Cyberscams and The Brain

What Makes Us Click? Cyberscams and The Brain

In this episode, Tripwire’s Senior UX Researcher, Martina Dove, uses her psychology research to explain to us how the brain operates when presented with a cyberscam. She also discusses her model for identifying fraud susceptibility and what we can do to prevent falling for these scams. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 Tim Erlin: When we speak about cybersecurity, we often focus on many of the technical aspects of how to secure our businesses as well…

Read More

The next big thing in network security?

The next big thing in network security?

It’s no surprise, but the security threat landscape is rapidly becoming more sophisticated, as evidenced by the Colonial Pipeline, Kaseya, and SolarWinds attacks earlier this year. Considering the pace of digital transformation in today’s business, a single cyberattack can bring a company’s operations to a standstill. In June, FBI Christopher Wray commented that the cyber threat is increasing “almost exponentially” and the FBI was looking into more than 100 different ransomware variants, a three-fold increase…

Read More

Monitoring Linux system resources with bpytop

Monitoring  Linux system resources with bpytop

The bpytop tool is similar to other performance monitoring tools available for Linux systems like top, iotop, htop, bashtop etc. It’s a terminal-based resource monitor that works efficiently and is visually appealing. The tool was ported from bashtop and rewritten in Python, so you need to have Python—version 3.6 or later—installed on your system to use it. (The “bpy” portion of the name undoubtedly stands for “bash Python”.) If you already have Python installed on…

Read More

3 steps to improve collaboration between networking and security pros

3 steps to improve collaboration between networking and security pros

(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams. This article discusses challenges faced by these teams based on a survey of 366 IT and security professionals detailed in the report “NetSecOps: Aligning Networking and Security Teams to Ensure Digital Transformation”, by EMA Vice President of Research Networking Shamus McGillicuddy.) As the network engineers and architects who design, build, and manage…

Read More

US and Israel Agree Anti-Ransomware Coalition

US and Israel Agree Anti-Ransomware Coalition

The US and Israel yesterday announced a new bilateral partnership designed to tackle ransomware. The move comes as part of the new US-Israeli Task Force launched on Sunday slated to cover Fintech Innovation and Cybersecurity more broadly. Its participants are currently working on a Memorandum of Understanding (MoU) to support joint activities, including information sharing in threat intelligence, security guidance and regulations. Also mooted are staff training, study visits and cross-border competency-building initiatives such as cybersecurity exercises…

Read More

CISA: Patch These ICS Flaws Across Multiple Vendors

CISA: Patch These ICS Flaws Across Multiple Vendors

The US authorities have released a new industrial control systems (ICS) alert urging impacted organizations to patch key middleware or risk denial of service and remote code execution attacks. The Cybersecurity and Infrastructure Security Agency (CISA) pointed to a series of vulnerabilities impacting open-source and proprietary implementations of the Object Management Group (OMG) Data-Distribution Service (DDS). The bugs are found in multiple vendors’ equipment: CycloneDDS, FastDDS, GurumDDS, OpenDDS, Connext DDS Professional, Connext DDS Secure, Connext…

Read More
1 3,438 3,439 3,440 3,441 3,442 4,053