How Cyber Insurance Can Protect Your Business from Breach of Privacy Claims

How Cyber Insurance Can Protect Your Business from Breach of Privacy Claims

By Irena Ducic, Growth Marketer, Embroker Article text: Every company that stores and handles sensitive customer, partner, or vendor information has the responsibility to protect that data from a variety of potential attackers. If this data is stolen or its privacy compromised in any way, the company can be held liable for such incidents. These types of claims can potentially cost your company a lot of money, not just in settlements or damages, but also…

Read More

Why it’s important to create a common language of cyber risk

Why it’s important to create a common language of cyber risk

All departments of an organization need to be on the same page where cybersecurity is concerned, and that will only happen if the terminology used is understood by all. Image: iStockphoto/anyaberkut Things work better when everyone is on the same page, and that includes the ability to discuss a topic using language that imparts the same meaning to all.  SEE: Security incident response policy (TechRepublic Premium) There’s a party game—Whisper Down the Lane, known in…

Read More

Cisco: Product sales jump, so do some prices

Cisco: Product sales jump, so do some prices

Cisco’s 4Q and year-end financial reports highlight growth in many categories that are important to enterprise customers including wireless, campus switching, routing and security products. CEO Chuck Robbins said that the company’s fourth quarter boasts the strongest product-order growth rate the company has seen in over a decade, citing a 30% product order growth year on year, and more than 17% order growth versus pre-COVID Q4 fiscal 19 product bookings. “In Q4, we saw double-digit…

Read More

Cisco: Product sales jump as do some prices

Cisco: Product sales jump, so do some prices

Cisco’s 4Q and year-end financial reports highlight growth in many categories that are important to enterprise customers including wireless, campus switching, routing and security products. CEO Chuck Robbins said that the company’s fourth quarter boasts the strongest product-order growth rate the company has seen in over a decade, citing a 30% product order growth year on year, and more than 17% order growth versus pre-COVID Q4 fiscal 19 product bookings. “In Q4, we saw double-digit…

Read More

Women Charged Over Sexually Exploitative Child Modeling Sites

Women Charged Over Sexually Exploitative Child Modeling Sites

Four Floridians have been charged in connection with a child sexual abuse material (CSAM) subscription service that produced millions of images and videos of sexualized minors.  International Florida-based business Newstar Enterprise, which was founded in 2005, built, maintained, hosted, and operated what appeared to be a series of legitimate child modeling websites called Newstar Websites on servers based in the US and abroad. According to court documents, Newstar was in reality “an internet-based business aimed…

Read More

New analysis of Diavol ransomware reinforces the link to TrickBot gang

New analysis of Diavol ransomware reinforces the link to TrickBot gang

Researchers conducted a new analysis of the Diavol ransomware and found new evidence of the link with the gang behind the TrickBot botnet. In July, researchers from Fortinet reported that a new ransomware family, tracked as Diavol, might have been developed by Wizard Spider, the cybercrime gang behind the TrickBot botnet. The Trickbot botnet was used by threat actors to spread the Ryuk and Conti ransomware families, experts noticed similarities between Diavol and Conti threats. Unlike Conti, Diavol doesn’t avoid infecting…

Read More

How to configure SSH access through Webmin

How to configure SSH access through Webmin

Looking for an easier way to configure SSH on your data center servers? How about Webmin? Jack Wallen walks you through some of the options for better SSH security using this web-based GUI. Nearly every Linux server I administer is done via SSH. Given that I’ve been working with Linux for over 20 years, configuring SSH with an eye on security is pretty simple for me. But most often I’m doing this on smaller deployments,…

Read More

T-Mobile breach exposed personal data of almost 50 million people

T-Mobile breach exposed personal data of almost 50 million people

Attackers captured the names, dates of birth, Social Security numbers and driver’s license numbers of millions of current, former and potential T-Mobile customers. Getty Images/iStockphoto A cyberattack against T-Mobile has compromised the personal information of almost 50 million people, according to the carrier. In an update posted on Tuesday, the company said that certain customer data had been accessed and stolen by unauthorized individuals and that the data did include some personal information for a…

Read More

Coin Ninja CEO Admits Operating Darknet Bitcoin Mixer

Coin Ninja CEO Admits Operating Darknet Bitcoin Mixer

A CEO from Ohio has pleaded guilty to being the operator of a darknet-based Bitcoin ‘mixer’ service that laundered more than $300m Akron resident and CEO of Bitcoin media site Coin Ninja Larry Dean Harmon was at the helm of underground cryptocurrency laundering service Helix for three years, from 2014 to 2017.  During that time, the 38-year-old creator of crypto-wallet provider DropBit conspired with darknet vendors to launder over 350,000 Bitcoin generated through drug trafficking and other illegal activities. Helix partnered with…

Read More

Securing Industrial IoT —a duet for OT and IT – Cisco Blogs

Securing Industrial IoT —a duet for OT and IT – Cisco Blogs

Cybersecurity has become a regular conversation topic at my dinner table, initiated by my kids and husband. The attack on the Colonial Pipeline brought us long lines at the gas stations and threatened to close school. The attack on the world’s largest meat processing company, JBS, had us wondering if we’d have to radically change the way we eat. The experiences of just one family hint at the massive impact of industrial security breaches on…

Read More
1 3,600 3,601 3,602 3,603 3,604 4,006