The fire in the OVH datacenter also impacted APTs and cybercrime groups

The fire in the OVH datacenter also impacted APTs and cybercrime groups

The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT groups and cybercrime gangs. OVH, one of the largest hosting providers in the world, has suffered this week a terrible fire that destroyed its data centers located in Strasbourg. The French plant in Strasbourg includes 4 data centers, SBG1, SBG2, SBG3, and SBG4 that were shut down due to the incident, and the fire started in SBG2…

Read More

OVH Data Center Fire Impacts Cyber-criminals

OVH Data Center Fire Impacts Cyber-criminals

Cyber-criminals’ illegal activities have been disrupted by a severe fire at the Strasbourg data centers of one of the largest web-hosting providers in the world.  The fire began at 00:47 on March 10 in a room of data center SBG2, which belongs to OVHcloud. SBG2 was completely wiped out in the blaze, which also destroyed four rooms of data center SBG1 and caused a shutdown of the servers in SBG3 and SBG4.  It took over 100 firefighters working…

Read More

How to use Bitwarden’s new Send feature

How to use Bitwarden’s new Send feature

What is probably the best open source password manager on the market has added a new feature that will make using the tool even better. Image: Jack Wallen The developers of the Bitwarden password manager are always looking to improve their software. When their PR guys reached out to me last week to let me know of a new feature, you can bet I was all ears. Said feature isn’t a deal maker or breaker,…

Read More

Judge Upholds Privacy Lawsuit Against Google

Judge Upholds Privacy Lawsuit Against Google

A lawsuit accusing Google of collecting data from users who are browsing the internet in “incognito mode” will go ahead. The suit, brought against the tech giant in June 2020, alleges that even when consumers turn off data collection in Chrome, their personal data is gathered by other Google tools. According to the complaint, “Google tracks and collects consumer browsing history and other web activity data no matter what safeguards consumers undertake to protect their data…

Read More

Level up your Secure Email game using SecureX Orchestrator – Cisco Blogs

Level up your Secure Email game using SecureX Orchestrator – Cisco Blogs

Today, an email administrator needs to get the most out of their data and reporting when it comes to the daily management of Business Email Compromise, Ransomware, Malware, and Phishing. The email administrator also has to share the data, reporting and actual emails allowing their SOC and other teams in order to perform X, Y, Z. In my video, I have provided the steps to configure the Cisco Secure Email module in SecureX. This allows…

Read More

Business and Human Rights at Cisco – Cisco Blogs

Business and Human Rights at Cisco – Cisco Blogs

As technology continues to advance and open new opportunities for communication and innovation, there is also increased risk for it to be used in ways inconsistent with laws or international norms regarding human rights. Cisco has long recognized that we have a responsibility to respect human rights. We are meeting this responsibility in a way that reflects the global nature of our business, the complexity of our supply chain and selling programs, and the rapid…

Read More

How IBM Cloud Satellite Works in Private Cloud Deployments – Cisco Blogs

How IBM Cloud Satellite Works in Private Cloud Deployments – Cisco Blogs

A look at the technologies that make up IBM Cloud Satellite Infrastructure Service As Keith Dyer (VP, IBM Alliance, Cisco Global Partner Organization) explained in his recent blog, Cisco has worked with IBM to build an offering based on IBM Cloud Satellite – IBM Cloud Satellite Infrastructure Service (IS). To recap: IBM Cloud Satellite allows clients to build and run applications in any public cloud, on-premises, or at the edge, and enables them to access…

Read More

5 minutes with George Waller – Best practices when using video conferencing platforms

5 minutes with George Waller – Best practices when using video conferencing platforms

5 minutes with George Waller – Best practices when using video conferencing technology | 2021-03-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Free one-day virtual summit for the sports and events industry: prepping for the return of fans

Free one-day virtual summit for the sports and events industry: prepping for the return of fans

Free one-day virtual summit for the sports and events industry: prepping for the return of fans | 2021-03-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated…

Read More

New Dates Confirmed for Infosecurity Europe 2021

New Dates Confirmed for Infosecurity Europe 2021

Leading information security event Infosecurity Europe will now take place July 13-15 2021 at London’s Olympia, organizer Reed Exhibitions has announced today (March 15). The news follows a statement made by the company on February 24 explaining that the event, originally due to take place June 8-10, would be delayed until later in the year due to the ongoing COVID-19 pandemic situation. Today’s announcement outlined that Reed Exhibitions will be taking all the appropriate steps…

Read More
1 3,709 3,710 3,711 3,712 3,713 3,749