U.K.’s University of Kent establishes cybersecurity and conflict institute

U.K.’s University of Kent establishes cybersecurity and conflict institute

U.K.’s University of Kent establishes cybersecurity and conflict institute | 2021-01-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Asset Management, The Weakest Link in Cybersecurity Risk

Asset Management, The Weakest Link in Cybersecurity Risk

By Gyan Prakash, Head of Cyber Security / Security Engineering, Altimetrik Corp Summary This paper shares the details on the limitations of existing asset management solutions for Cybersecurity needs and how to enhance the capability of existing asset management solutions that would meet enterprise cybersecurity risk needs. Uncover high-risk and vulnerable assets to CISOs and senior management with data-driven automation on a near real-time basis. Highlights the gap in the current asset management solutions and…

Read More

President Biden’s FCC appointment is a big step toward net neutrality’s return | ZDNet

President Biden’s FCC appointment is a big step toward net neutrality’s return | ZDNet

When former Federal Communications Commission (FCC) Chairman Ajit Pai left office on Jan. 20, 2021, his departure was greeted with hoots of derision. His crime? Destroying net neutrality. Now, President Joe Biden has named FCC member and net neutrality champion Jessica Rosenworcel to chair the Commission. This is a big step forward for net neutrality’s return.  While President Donald Trump and Pai helped destroy net neutrality to the advantage of major ISPs and telecoms, Rosenworcel…

Read More

MITRE ATT&CK: The Magic of Segmentation – Cisco Blogs

MITRE ATT&CK: The Magic of Segmentation – Cisco Blogs

In cybersecurity, nation states, cyber criminals, hacktivists, and rogue employees are the usual suspects. They fit nicely into categories like external attackers or insider threats. But what about our essential suppliers, partners, and service providers? We rely on them, sometimes inviting them in to help manage our networks and internal systems. It’s easy to overlook them as possible pathways for cyberattacks. But the shocking cyberattack discovered in December shined a bright light on supply chain…

Read More

Docker Captain Take 5 – Elton Stoneman – Docker Blog

Docker Captain Take 5 – Elton Stoneman – Docker Blog

Docker Captains are select members of the community that are both experts in their field and are passionate about sharing their Docker knowledge with others. “Docker Captains Take 5” is a regular blog series where we get a closer look at our Captains and ask them the same broad set of questions ranging from what their best Docker tip is to whether they prefer cats or dogs (personally, we like whales and turtles over here)….

Read More

What is a DoS (denial-of-service) attack? – IT Governance UK Blog

What is a DoS (denial-of-service) attack? – IT Governance UK Blog

Denial-of-service (DoS) attacks are intended to shut down or severely disrupt an organisation’s systems. Unlike most cyber attacks, the goal isn’t to steal sensitive information but to frustrate the victim by knocking their website offline. The criminal hacker therefore doesn’t profit from the attack, but the loss of service can cost the victim up to £35,000. Why would an attacker be interested in doing this? Typically, it’s because they hold a grudge against the target…

Read More

Defense More Effective Than Offense to Curb Nation State Threat Actors

Defense More Effective Than Offense to Curb Nation State Threat Actors

The effectiveness of offensive capabilities in deterring nation state actors was discussed by a panel during the recent ‘RSAC 365 Innovation Showcase: Cyber Deterrence’ webinar. Chair of the session, Jonathan Luff, co-founder at Cylon, observed that now is the ideal time to be asking if and when offensive strikes should be used following the Russian state-backed SolarWinds attacks at the end of last year, as well as the inauguration of newly-elected President Joe Biden this…

Read More

The new Microsoft Edge browser will warn you if your password has been leaked online

The new Microsoft Edge browser will warn you if your password has been leaked online

The new Edge 88 browser includes tough new security features, including a password generator and a tool for monitoring whether your login details have been exposed to the dark web. Edge 88 began rolling out on 21 January. Image: Microsoft Microsoft Edge 88 is rolling out to users in the Stable channel alongside some new privacy-focused features, including a long-awaited credentials monitor and a built-in password generator. The first of these features, Password Monitor, will…

Read More

ICO Urged to Investigate Secretive Tory Party Consultancy

ICO Urged to Investigate Secretive Tory Party Consultancy

A leading rights group has asked the UK’s data protection regulator to urgently investigate the role of a shadowy political consultancy over claims that it helped the Conservative Party to general election victory in 2019. CT Group is a global lobbying and consulting firm founded by long-time Tory collaborator Lynton Crosby. Its CT Partners Limited business accounted for nearly 40% of the Conservative Party’s £4.5m spend on “Market Research/Canvassing” at the last election, way more than…

Read More

5 cybersecurity preparedness tips from two attorneys

5 cybersecurity preparedness tips from two attorneys

Cybersecurity bad actors are taking advantage of the COVID-19 pandemic and attacking businesses. Follow these best practices for protecting your organization before a security attack. Image: syahrir maulana, Getty Images/iStockphoto Technical advice on how to avoid falling victim to a coronavirus-based digital scam is everywhere; sadly, it does not seem to be helping. Knowing that, better advice might be for a company to have all its legal ducks in a row, just in case.    …

Read More
1 112 113 114 115 116 268