Four Security Best Practices for Today’s High-Risk Digital World – Cisco Blogs

Four Security Best Practices for Today’s High-Risk Digital World – Cisco Blogs

While digital acceleration has been building for some time, recent digital disruptions have shifted its pace into overdrive, leaving a ripple effect of security complications in its wake. Increases in online shopping, virtual communities, and the exponential growth in remote workforces have created more vulnerabilities than ever. Once rigid, IT’s now more porous walls have created a veritable playground for malicious actors, exposing businesses and their customer data to greater risk, potential data breaches, and…

Read More

Making an Impact – Empowering Girls in Mozambique  – Cisco Blogs

Making an Impact – Empowering Girls in Mozambique  – Cisco Blogs

During the rollercoaster of emotions 2020 brought, I decided to take action and become more involved with Cisco’s Inclusive Communities. It was something I had been telling myself that I would do for years. Now, I would make that happen. I started by joining our Women of Cisco Inclusive Community here in Portugal, and later in 2020 I was asked to co-lead our local chapter. What an honor! Not only was this a great way…

Read More

Are you ready for the 3G sunset?

Are you ready for the 3G sunset?

All good things must come to an end, and that includes the 3G network that has been around since the late aughts. Telcos are supporting and building out vastly superior 5G networks, and they don’t want to spend time and money maintaining older technologies that aren’t used much. Removing older 3G towers makes space for 5G equipment and simplifies network management. Plus, some 3G spectrum can be used for 4G data, although 3G can’t be…

Read More

How password hashing works on Linux

How password hashing works on Linux

You may know that passwords are hashed on Linux systems, and the hashes are stored in the restricted access /etc/shadow file. But did you know that you can also determine the hash method that was used and report the number of days since a password was last changed from this file as well? To look at a user record in the /etc/shadow file, run a command like this: $ sudo grep nemo /etc/shadow You should…

Read More

MoD Invites Innovators to Reduce Military’s Cyber-Attack Surface

MoD Invites Innovators to Reduce Military’s Cyber-Attack Surface

The UK’s Ministry of Defence (MoD) is calling on startups to help the military reduce its cyber-attack surface by designing a new generation of more secure hardware and software. The MoD’s Defence and Security Accelerator (DASA) issued the call-to-arms on Monday, claiming it is prepared to fund proposals up to £300,000 for a nine-month contract. “The Defence Science and Technical Laboratory (DSTL) on behalf of the MoD is interested in identifying and accelerating next generation hardware and software technologies…

Read More

Are We Past Peak Ransomware? | The State of Security

Are We Past Peak Ransomware? | The State of Security

In this episode, Greg Wilson, CISO of Docupace, discussed the rise of ransomware during uncertain times (i.e. COVID pandemic), whether it’s here to stay, and how to prevent damage with security hygiene. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 In the latest episode of the Tripwire Cybersecurity podcast, I had the opportunity to interview Greg Wilson, the Chief Information Security Officer at Docupace. Tim Erlin:  Welcome, Greg. Thanks for joining us.  Today, the topic that we’re going…

Read More

The Top 10 Highest Paying Jobs in Information Security – Part 1

The Top 10 Highest Paying Jobs in Information Security – Part 1

Want a job in cybersecurity? There are plenty to go around. Cybersecurity Ventures estimated that there will be 3.5 million job openings in the industry by the end of the year. That makes sense. According to Gartner, global spending on information security and risk management technology is expected to exceed $150 billion in 2021. Organizations are going to need someone to help them manage those new solutions. The issue is that information security is an…

Read More

Colonial Pipeline Reportedly Admits Data Breach

Colonial Pipeline Reportedly Admits Data Breach

Colonial Pipeline has reportedly admitted that nearly 6000 individuals may have had their personal information compromised by ransomware attackers when they struck earlier this year. The fuel pipeline operator, which was crippled by the attack in May, confirmed to CNN Business that it had begun sending out breach notification letters to 5810 victims. Most of those affected are thought to be current and former employees and family members. The compromised information is thought to include names,…

Read More

How much does phishing really cost the enterprise?

How much does phishing really cost the enterprise?

Dive Brief:  The financial impact of phishing attacks quadrupled over the past six years, with the average cost rising to $14.8 million per year for U.S. companies in 2021, compared with $3.8 million in 2015, according to a study from the Ponemon Institute on behalf of Proofpoint released Tuesday. Researchers surveyed 591 IT and IT security professionals. Companies spent almost $6 million per year on business email compromise (BEC) recovery, which includes about $1.17 million…

Read More
1 3,619 3,620 3,621 3,622 3,623 4,016