Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously | McAfee Blogs

Trust Nobody, Not Even Yourself: Time to Take Zero Trust Seriously | McAfee Blogs

In the working world, there’s a chance you’ve come across your fair share of team-building exercises and workshops. There’s one exercise that comes to mind that often results in worried, and uneasy faces during these seminars: The Trust Fall. This is where you fall backward with the expectation that your colleague will catch you before you hit the ground.    Whether you have been with an organization for many years or just started, the same “pit in stomach” feeling reverberates across bellies as…

Read More

Downloading an app for virtual care? No need. Webex Telehealth Connect for Epic. – Cisco Blogs

Downloading an app for virtual care? No need. Webex Telehealth Connect for Epic. – Cisco Blogs

“Cisco in Healthcare? Don’t you just sell switches and routers?” When I talk to clinicians, this is often a question they ask. And we welcome the conversation because it means we can stop talking bits, bytes, speeds and feeds and really dive into how technology is transforming patient care. We can talk about how Webex, voice, video, contact center, wireless and mobility technologies have transformed every clinician’s experience.  We can talk about how Cisco has…

Read More

Lessons We Can Learn From Airport Security | McAfee Blogs

Lessons We Can Learn From Airport Security | McAfee Blogs

Most of us don’t have responsibility for airports, but thinking about airport security can teach us lessons about how we consider, design and execute IT security in our enterprise. Airports have to be constantly vigilant from a multitude of threats; terrorists, criminals, rogue employees and their security defenses need to combat major attacks, individual threats, stowaways, smuggling as well as considering the safety of passengers and none of this can stop the smooth flow of…

Read More

Cisco at Red Hat Summit 2021 – Cisco Blogs

Cisco at Red Hat Summit 2021 – Cisco Blogs

Mark your calendar! Register now for Cisco at Red Hat Summit 2021 on April 27-28 and June 15-16, 2021. In the next week, we are participating (virtually) at Red Hat Summit 2021 as a gold sponsor. We are excited to showcase how our partnership with Red Hat is continuously evolving and how Cisco is helping customers modernize their data center and applications with simplified infrastructure. Cisco and Red Hat are market leaders offering best in class…

Read More

The Need for Continuous and Dynamic Threat Modeling – Cisco Blogs

The Need for Continuous and Dynamic Threat Modeling – Cisco Blogs

This blog is co-authored by Mohammad Iqbal and is part four of a four-part series about DevSecOps. The trend towards accelerated application development, and regular updates to an architecture through an agile methodology, reduces the efficacy and effectiveness of point-in-time threat modeling. This recognition led us to explore and strategize ways to continuously, and dynamically, threat model an application architecture during runtime. Today, thanks to a robust DevOps environment, developers can deploy a complex architecture…

Read More

Rapid7 Acquires Open Source Monitoring Platform Velociraptor

Rapid7 Acquires Open Source Monitoring Platform Velociraptor

Rapid7 has announced the acquisition of open source software technology and community Velociraptor. The move will enable Rapid7 to enhance its incident response capabilities by leveraging Velociraptor’s open source platform, which is used for endpoint monitoring, digital forensics and incident response. Velociraptor was developed to help digital forensics and incident response (DFIR) professionals to discover and monitor malicious activities. The platform’s community style also allows DFIR pros to share their insights with one another. It’s…

Read More

Beware of BRATA: How to Avoid Android Malware Attack | McAfee Blogs

Beware of BRATA: How to Avoid Android Malware Attack | McAfee Blogs

Cybercriminals go to great lengths to hack personal devices to gather sensitive information about online users. To be more effective, they make significant investments in their technology. Also, cybercriminals are relying on a tactic called social engineering, where they capitalize upon fear and urgency to manipulate unsuspecting device users to hand over their passwords, banking information, or other critical credentials.  One evolving mobile device threat that combines malware and social engineering tactics is called BRATA. BRATA has been recently upgraded by its malicious creators and several strains have already been downloaded thousands of times, according to a McAfee Mobile Research Team report.  …

Read More

Take this culture quiz to see if your users trust your cybersecurity training and team

Take this culture quiz to see if your users trust your cybersecurity training and team

Security firm launches 18-question test to measure what employees think of security practices and how comfortable they are with calling out possible risks. Image: iStock/NicoElNino Most cybersecurity training teaches users to spot phishing emails or explains how to report suspicious activity. Security company Infosec is taking a different approach by measuring a company’s security culture. This user assessment aims to understand employee attitudes about security and their comfort level in contacting the security team.  Jack…

Read More

The Power of Inclusive Innovation – Cisco Blogs

The Power of Inclusive Innovation – Cisco Blogs

Maria Callaghan This blog follows a mutual interview between Carlos Pignataro, Chief Technology Officer of Customer Experience at Cisco, and Maria Callaghan, Privacy and Transparency Program Manager in Cisco Security & Trust. “Diversity is not how we differ. Diversity is about embracing one another’s uniqueness.” -Ola Joseph The Start of a Mentorship Carlos: Thank you for joining me today to discuss the importance of inclusion and collaboration in the realm of innovation. Why don’t we…

Read More

UK Government Pressing Ahead with New IoT Law Amid Pandemic Smart Device Surge

UK Government Pressing Ahead with New IoT Law Amid Pandemic Smart Device Surge

The UK government is pushing forward with legislation that imposes new security obligations on the manufacturers of Internet of Things (IoT) devices, the Department of Digital, Media and Sport (DCMS) has announced today. The announcement has come amid growing use of IoT devices, with the UK government highlighting figures from the end of last year showing that almost half (49%) of UK residents have purchased at least one smart device since the start of the…

Read More
1 3,644 3,645 3,646 3,647 3,648 3,779