Automating Asset Management with Tripwire Enterprise

Automating Asset Management with Tripwire Enterprise

Asset management is a tricky subject. In many cases, organizations have no idea about how many assets they have, let alone where they are all located.  Fortunately, there are tools that can assist with reaching your asset management goals. While Tripwire Enterprise (TE) is great for detecting unauthorized changes on your system and also for ensuring your systems are hardened (as well as stay hardened), you must first get a handle on managing the assets that you’re…

Read More

Smart buildings: is BACnet a secure protocol? – Cisco Blogs

Smart buildings: is BACnet a secure protocol? – Cisco Blogs

If you don’t already work in a “smart building,” chances are that you will soon. By 2025, more than 75% of new construction will fit this category—and that’s not counting existing buildings. Connecting building systems like heating, ventilation, air conditioning, lighting, physical access controls, and fire detection to the IP network can increase energy efficiency, health, comfort, and safety. But smart building networks need security protections. Attacks on a building controllers can shut down heating…

Read More

Intel releases 3rd-gen Xeon Scalable processor

Intel releases 3rd-gen Xeon Scalable processor

Intel today launched the third generation of its Xeon Scalable server-processor line with more than three dozen new chips built on its long-overdue 10-nanometer manufacturing process and featuring a host of specialized features for security and AI. The new chips were developed under the codename Ice Lake and were long in coming, due to the delays Intel had getting its manufacturing process down to 10nm. AMD, through its TSMC manufacturing partner, is at 7nm and…

Read More

Firmware attacks, a grey area in cybersecurity of organizations

Firmware attacks, a grey area in cybersecurity of organizations

A new report published by Microsoft revealed that 80% of global enterprises were victims of a firmware-focused cyberattack. Microsoft recently published a report that states, titled “March 2021 Security Signals report,” that revealed that more than 80% of enterprises were victims of at least one firmware attack in the past two years. The study pointed out that only 29% of the targeted organizations have allocated budgets to protect firmware. A vast majority of companies in a global…

Read More

Arista Networks to Announce Q1 2021 Financial Results on Tuesday, May 4th 2021

Arista Networks to Announce Q1 2021 Financial Results on Tuesday, May 4th 2021

Announces Participation in Upcoming Investor Events SANTA CLARA, Calif.–(BUSINESS WIRE)– Arista Networks, Inc. (NYSE:ANET) will release its financial results for the quarter ended March 31, 2021 after U.S. markets close on Tuesday, May 4th, 2021. The results will be included in a press release with accompanying financial information that will be posted on the Investor Relations section of the Arista website at https://investors.arista.com. Arista’s executive management team will host a conference call on May 4th,…

Read More

Florida School District Held to Impossibly High Ransom

Florida School District Held to Impossibly High Ransom

Cyber-criminals behind a cyber-attack on a Florida school district are demanding a ransom payment of $40m in cryptocurrency.  The computer system of Broward County Public Schools was compromised at the beginning of March by data-locking ransomware in a Conti gang operation. The attack caused a system shutdown but left classes undisturbed.  Broward is the sixth-largest school district in the United States with 271,000 students and an annual budget of around $4bn.  The district, which is based in Fort…

Read More

The Future of Education Is in the Cloud – Cisco Blogs

The Future of Education Is in the Cloud – Cisco Blogs

Out of the classroom and into the clouds For a long time, teaching has been confined to the four walls of a room, strictly associated with a teacher, accompanied by a whiteboard, and taught through textbooks. There is nothing wrong with the above scenario. On the contrary: it was a huge success in previous centuries. Particularly during the twentieth century, traditional education, science, and technology contributed to immense progress: one key example being that life…

Read More

Parrot Launches Bug Bounty Program

Parrot Launches Bug Bounty Program

European drone manufacturer Parrot has partnered with crowdsourced security platform YesWeHack to launch a Bug Bounty program. By setting up the two-phase program, Parrot hopes that potential vulnerabilities in its drones, mobile applications, and web services will be identified by YesWeHack’s community of more than 22,000 cybersecurity researchers. “After the integration of cybersecurity from the initial design phase of Parrot drones, the Bug Bounty launched with YesWeHack completes the audits and brings an additional step of control,” said Victor Vuillard,…

Read More

McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware | McAfee Blogs

McAfee ATR Threat Report: A Quick Primer on Cuba Ransomware | McAfee Blogs

Executive Summary  Cuba ransomware is an older ransomware, that has recently undergone some development. The actors have incorporated the leaking of victim data to increase its impact and revenue, much like we have seen recently with other major ransomware campaigns.  In our analysis, we observed that the attackers had access to the network before the infection and were able to collect specific information in order to orchestrate the attack and have the greatest impact. The attackers operate using a set of PowerShell scripts that…

Read More

McAfee Defender’s Blog: Cuba Ransomware Campaign | McAfee Blogs

McAfee Defender’s Blog: Cuba Ransomware Campaign | McAfee Blogs

Cuba Ransomware Overview Over the past year, we have seen ransomware attackers change the way they have responded to organizations that have either chosen to not pay the ransom or have recovered their data via some other means. At the end of the day, fighting ransomware has resulted in the bad actors’ loss of revenue. Being the creative bunch they are, they have resorted to data dissemination if the ransom is not paid. This means…

Read More
1 3,451 3,452 3,453 3,454 3,455 3,550