How to raise the cybersecurity poverty line and make companies more secure

How to raise the cybersecurity poverty line and make companies more secure

The cybersecurity poverty line is a term that can help companies understand security gaps and build better awareness. Learn more about it and how it applies to your organization. Image: Peter Dazeley/The Image Bank/Getty Images. As a system administrator, cybersecurity has been especially prominent on my mind for the past year as my organization has exclusively engaged in remote work. I’m actually seriously considering a career transition into this field and speaking more with cybersecurity…

Read More

UK Sports Teams Boycott Social Media

UK Sports Teams Boycott Social Media

Professional sports teams in the United Kingdom have stopped posting on social media in a bid to raise awareness of online abuse.  Soccer clubs including Birmingham City, Swansea City, and Rangers are taking part in a week-long boycott of all their social media platforms.  Swansea led the way, with the club’s official social media accounts falling silent at 17:00 on April 8. The club’s boycott has been supported and echoed by its staff and by the men…

Read More

This man was planning to kill 70% of Internet in a bomb attack against AWS

This man was planning to kill 70% of Internet in a bomb attack against AWS

The FBI arrested a man for allegedly planning a bomb attack against Amazon Web Services (AWS) to kill about 70% of the internet. The FBI arrested Seth Aaron Pendley (28), from Texas, for allegedly planning to launch a bomb attack against Amazon Web Services (AWS) data center on Smith Switch Road in Ashburn, Virginia. The man was attempting to buy C-4 plastic explosives from an undercover FBI employee, the explosive would have been used to…

Read More

April’s Cybersecurity & Geopolitical podcast is up!

April’s Cybersecurity & Geopolitical podcast is up!

April’s Cybersecurity & Geopolitical podcast is up! | 2021-04-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Biden Nominates More Ex-NSA Officials to Top Cybersecurity Roles

Biden Nominates More Ex-NSA Officials to Top Cybersecurity Roles

Four months after his inauguration, the president of the United States, Joe Biden, has named two former National Security Agency (NSA) officials to top cybersecurity roles in his administration. On Monday, the White House announced the nomination of former NSA deputy director John C. “Chris” Inglis as the government’s first national cyber director. Ex-deputy director of the NSA’s counterterrorism center, Jen Easterly, was named to head up the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency…

Read More

How to provide both a Secure & Seamless Remote Onboarding Experience on a Regula Basis?

How to provide both a Secure & Seamless Remote Onboarding Experience on a Regula Basis?

By Arif Mamedov, Ph.D., President of Regula Forensics, Inc. Onboarding is like a gateway, where you as a guard can either let the right person in or assure that a fraudster shall not pass through. That process contains a challenge: if it is not streamlined enough, a huge abandonment rate can occur. Ever since the COVID-19 pandemic began to impact government policy, everything has become digital and this has brought another challenge for myriads of…

Read More

BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain | McAfee Blogs

BRATA Keeps Sneaking into Google Play, Now Targeting USA and Spain | McAfee Blogs

Recently, the McAfee Mobile Research Team uncovered several new variants of the Android malware family BRATA being distributed in Google Play, ironically posing as app security scanners. These malicious apps urge users to update Chrome, WhatsApp, or a PDF reader, yet instead of updating the app in question, they take full control of the device by abusing accessibility services. Recent versions of BRATA were also seen serving phishing webpages targeting users of financial entities, not…

Read More

Paving the way: Inspiring Women in Payments – A podcast featuring Noel Haskins-Hafer

Paving the way: Inspiring Women in Payments – A podcast featuring Noel Haskins-Hafer

  With a background in Russian language and literature, Noel Haskins-Hafer might have seemed like an unlikely candidate for a career in technology. But through her love for learning, she started out in the industry by reading IBM manuals and assembler programming books, often while on vacation. Over time, she explored and eliminated roles that she hated until she discovered where she fit, and what she loved, in the realm of audit and compliance. In…

Read More

Securing AWS EKS Environments – Cisco Blogs

Securing AWS EKS Environments – Cisco Blogs

So, your organization’s simplifying Kubernetes management with AWS’s Elastic Kubernetes Service (EKS). Now, how are you going to secure that cluster? Whether your role is on the application team, or in DevOps or SecOps, you might be thinking: We chose EKS because agility is important to us. Similarly, we need manageable and efficient security, so we can stay focused on what only our team can do. Whether your organization is embracing a zero trust security…

Read More

Iran Nuclear Facility Suffers Cyber-Attack

Iran Nuclear Facility Suffers Cyber-Attack

An Iranian nuclear facility south of Tehran has been hit by cyber-attackers, according to the country’s chief nuclear official.  Ali Akbar Salehi said that the attack on the Natanz complex took place the day after Iran unveiled new equipment to enrich uranium. In a ceremony broadcast live on television on April 10, the country’s president, Hassan Rouhani, inaugurated new centrifuges at the Natanz site.  According to the Federation of American Scientists, centrifuges can raise serious nuclear weapons…

Read More
1 3,442 3,443 3,444 3,445 3,446 3,553