Berners-Lee Joins ProtonMail Following Privacy Debacle

Berners-Lee Joins ProtonMail Following Privacy Debacle

Tim Berners-Lee has joined the advisory board of ProtonMail, just days after the encrypted email service was criticized for unmasking the identity of a user for French police. The worldwide web inventor was a scientist at the European Organization for Nuclear Research (CERN) at the same time as ProtonMail CEO Andy Yen, and helped to sketch the initial plans for what is now the world’s largest encrypted email service, with over 50 million users. “I’m…

Read More

How Groove Gang is Shaking up the Ransomware-as-a-Service Market to Empower Affiliates

How Groove Gang is Shaking up the Ransomware-as-a-Service Market to Empower Affiliates

Co-authored with Intel471 and McAfee Enterprise Advanced Threat Research (ATR) would also like to thank Coveware for its contribution. Executive Summary McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. These cybercriminals are happy to put aside previous Ransomware-as-a-Service hierarchies to focus on the ill-gotten gains to be made from controlling victim’s networks, rather than the previous approach which prioritized…

Read More

AI pivotal for forensic investigative teams to handle crushing data volumes

AI pivotal for forensic investigative teams to handle crushing data volumes

AI pivotal for forensic investigative teams to handle crushing data volumes | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

CIS Control 3: Data Protection – Protect and Identify to safeguard data

CIS Control 3: Data Protection – Protect and Identify to safeguard data

For many years, there was a wide misunderstanding that encrypting some data is equivalent to protecting that data. If it’s encrypted, so the thinking goes, nobody else could access it, and it is therefore safe. While it is critical to encrypt data at rest as well as in transit, the job of protecting data goes much deeper. Encryption can mitigate risk from certain attack scenarios such as physically compromised hardware or a tapped network link,…

Read More

CIS Control 3: Data Protection – Protect and Identify to safeguard data

CIS Control 3: Data Protection – Protect and Identify to safeguard data

For many years, there was a wide misunderstanding that encrypting some data is equivalent to protecting that data. If it’s encrypted, so the thinking goes, nobody else could access it, and it is therefore safe. While it is critical to encrypt data at rest as well as in transit, the job of protecting data goes much deeper. Encryption can mitigate risk from certain attack scenarios such as physically compromised hardware or a tapped network link,…

Read More

Enhancing cybersecurity skills for the entire workforce must be a priority for cyber-resilience

Enhancing cybersecurity skills for the entire workforce must be a priority for cyber-resilience

Technology is not the only answer: An expert suggests improving the human cyber capacity of a company’s workforce plus cybersecurity technology offers a better chance of being safe. Image: iStock/vadimrysev Risk resulting from a cybersecurity event affects the entire organization. “As such, the cyber workforce—those responsible for preventing and responding to an attack—are no longer limited to just ‘the geeks in the basement,’” said James Hadley, CEO and founder of Immersive Labs, in an email…

Read More

Shoring up Network Access Policy Management in the Calm Before the IoT Storm – Cisco Blogs

Shoring up Network Access Policy Management in the Calm Before the IoT Storm – Cisco Blogs

With some research forecasting that more than 75 million IoT devices will be deployed globally by 2025, enterprise IT administrators have a huge challenge on their hands: How to manage network access policies between so many users, devices, and networks with diverse access privileges. To date, mostly manual point solutions have been used to broadly enforce network access policies. They’re expensive, time-consuming, and inefficient. The clock is ticking. Devices are proliferating. Cybercrime cost the world…

Read More

IBM intros new generation of IBM Power servers

IBM intros new generation of IBM Power servers

IBM is keeping the faith for Unix just like it is for mainframes. It has announced a new Unix-based server, the IBM Power E1080, the first in a family that is based on the POWER10 processor. IBM announced the POWER10 processor last year. Designed on a 7nm process, it is expected to deliver up to a three-fold improvement in capacity and processor energy efficiency within the same power envelope as IBM POWER9. It features a…

Read More

Simplified Insertion of Cisco Secure Firewall with AWS Route Table Enhancement – Cisco Blogs

Simplified Insertion of Cisco Secure Firewall with AWS Route Table Enhancement – Cisco Blogs

Cisco Secure Firewall provides industry-leading firewall capabilities for Amazon Virtual Private Cloud (VPC)and resources deployed inside. Customers use these firewalls to protect north-south and east-west traffic. Typically, we provide north-south traffic inspection in AWS infrastructure by deploying a load balancer and adding firewalls behind it. Another approach uses Amazon VPC Ingress Routing to steer traffic to Cisco Secure Firewalls. Since the AWS VPC Ingress Routing feature launched, we’ve waited for a similar feature for east-west…

Read More

Machine learning is a great tool for cybersecurity, but be cautious, expert says

Machine learning is a great tool for cybersecurity, but be cautious, expert says

Supervised and unsupervised machine learning are good ways to detect threats. But what’s the difference? TechRepublic’s Karen Roby spoke with Chris Ford, VP of product for Threat Stack, about supervised and unsupervised machine learning. The following is an edited transcript of their conversation. SEE: Hiring Kit: Video Game Programmer (TechRepublic Premium) More about artificial intelligence Christopher Ford: Supervised and unsupervised learning are techniques that help to facilitate different use cases within the sphere of machine…

Read More
1 3,549 3,550 3,551 3,552 3,553 3,997