U.S. Government Must Do More to Protect Its Data and Systems

U.S. Government Must Do More to Protect Its Data and Systems

As you’ll recall, the White House published an Executive Order (EO) on Improving the Nation’s Cybersecurity back in May 2021. The EO issued several commands such as creating a Cyber Safety Review Board to lead post-incident analysis of significant security events and requiring software developers to make data about their solutions publicly known. The directive also emphasized the importance of moving the federal government to secure cloud services and zero-trust architecture as well as protecting…

Read More

Cisco named a leader in The Forrester Wave™: ICS Security – Cisco Blogs

Cisco named a leader in The Forrester Wave™: ICS Security – Cisco Blogs

Interest in industrial control systems (ICS) security has shot up in response to cyberattacks on organizations like the city of Oldsmar’s water utility, Honda, Merck, Maersk, and Johannesburg’s electric utility. New technologies have matured over the last few years to help build more advanced industrial security architectures. Assessing emerging solutions is always challenging—and ICS security is no exception. So it’s timely that Forrester issued an independent analysis of the most significant ICS security solutions. Cisco…

Read More

Dell Technologies to Hold Conference Call November 23 to Discuss Third Quarter Fiscal 2022 Financial Results | Dell Technologies

Dell Technologies to Hold Conference Call November 23 to Discuss Third Quarter Fiscal 2022 Financial Results | Dell Technologies

ROUND ROCK, Texas, Nov. 9, 2021 /PRNewswire/ — Dell Technologies (NYSE: DELL) will conduct a conference call Tuesday, November 23, 2021, at 4:30 p.m. CST to discuss its fiscal 2022 third quarter financial results. The conference will be available to the public as a live, audio-only webcast on Dell Technologies’ website at investors.delltechnologies.com; an archived version will be available at the same location. The company will issue the results via a press release with accompanying financial statements…

Read More

McAfee Sold to Investor Group for $14bn

McAfee Sold to Investor Group for bn

McAfee’s storied history took another turn this week after it announced a $14bn takeover by private investors. The all-cash deal will see ownership of the firm transferred to an investor group led by Advent International Permira Advisers LLC, Crosspoint Capital Partners, Canada Pension Plan Investment Board, GIC Private,  and a wholly-owned subsidiary of the Abu Dhabi Investment Authority. It’s the latest twist in an increasingly complicated corporate tale for the security giant, widely regarded as…

Read More

A $1.9B FCC fund to replace banned 5G telco gear might be too little

A .9B FCC fund to replace banned 5G telco gear might be too little

The Federal Communications Commission has opened up a $1.9 billion fund to help smaller, rural US telcos replace the 5G and other gear in their networks that is made by China-based Huawei and ZTE, whose equipment has been banned since the telecom providers bought it. The Secure and Trusted Communications Networks Reimbursement Program will help service providers remove, replace, and dispose of the equipment, but it’s not likely to cover all their costs. “It’s hard…

Read More

New Magecart group uses an e-Skimmer that avoids VMs and sandboxes

New Magecart group uses an e-Skimmer that avoids VMs and sandboxes

A new Magecart group leverages a browser script to evade virtualized environments and sandboxes used by researchers. Malwarebytes researchers have spotted a new Magecart group that uses a browser script to evade detection and the execution in virtualized environments used by security researchers for threat analysis. Hacker groups under the Magecart umbrella continue to target e-stores to steal payment card data with software skimmers. While malware developers often implement anti-vm features and check for registry keys and…

Read More

Electric Vehicle Charging: The Next Cyberattack Frontier

Electric Vehicle Charging: The Next Cyberattack Frontier

By Prof. Thomas R. Köhler, Member of the Board of Juice Technology AG The International Energy Agency estimates the global number of electric cars, buses, vans and heavy trucks on the road to reach 145 million by 2030.  In the U.S. estimates are that 28 million EVs will be sold within that timeframe, in concert with the administration’s goal of 50% of new car sales to be electric by 2030.  This will create a significant…

Read More

US to Charge Suspects Over Kaseya Ransomware Attack

US to Charge Suspects Over Kaseya Ransomware Attack

The US justice department is expected to announce it has charged a suspect over the damaging Kaseya ransomware attack in July, it has been reported. CNN said Ukrainian national Yaroslav Vasinskyi and Russian national Yevgeniy Polyanin will face charges relating to the deployment of ransomware known as REvil in the incident, which affected up to 1500 organizations throughout the world. These include conspiracy to commit fraud, money laundering and other charges. Vasinskyi was arrested in…

Read More

‘Tis The Season for Holiday Cyber Threats Targeting Enterprises in a Pandemic World

‘Tis The Season for Holiday Cyber Threats Targeting Enterprises in a Pandemic World

The holiday season is upon us, and many are preparing to celebrate with family and friends both near and far. While we tend to look at consumer tendencies during the holidays, the season also presents a significant challenge to industries coping with the increase in consumer demands. McAfee Enterprise and FireEye recently conducted a global survey of IT professionals to better understand their cyber readiness, especially during peak times like the holiday season, and the…

Read More

Flow and occupancy management with LiDAR

Flow and occupancy management with LiDAR

Flow and occupancy management with LiDAR | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 3,484 3,485 3,486 3,487 3,488 4,083