Report: Rise in COVID-19 Vaccine Social Engineering, BEC, Phishing

Report: Rise in COVID-19 Vaccine Social Engineering, BEC, Phishing

By Jessica Davis January 21, 2021 – Recent Proofpoint research shows hackers are continuing to prey on fears tied to the COVID-19 pandemic. And as the vaccine rollout continues, social engineering lures are being leveraged in malware, phishing, and business email compromise (BEC) attacks. Throughout the year, security researchers have consistently warned that hackers are using the pandemic to their advantage in a number of attacks. It follows repeated trends of cybercriminals leveraging popular, ongoing global…

Read More

How DMaaS eliminates data silos and 4 tips for choosing a provider

How DMaaS eliminates data silos and 4 tips for choosing a provider

Digital initiatives come in many flavors and vary widely, but they do have one thing in common and that’s data. That’s why the need to easily manage, analyze, and find key insights—and those “a-ha” moments—from data is critical to achieving and maintaining a market-leading position.  One quick look at leading companies today and it’s easy to see they aren’t just technology-centric companies, but data-centric ones. The challenge for most companies is how to make data…

Read More

The first line of defense: Why employees are the key to stronger cybersecurity

The first line of defense: Why employees are the key to stronger cybersecurity

The first line of defense: Why employees are the key to stronger cybersecurity | 2021-01-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Kroll adds three seasoned cybersecurity experts to Cyber Risk practice

Kroll adds three seasoned cybersecurity experts to Cyber Risk practice

Kroll adds three seasoned cybersecurity experts to Cyber Risk practice | 2021-01-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Ushering in cybersecurity’s new era with zero trust 2.0

Ushering in cybersecurity’s new era with zero trust 2.0

Ushering in cybersecurity’s new era with zero trust 2.0 | 2021-01-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Executive protection has gone digital

Executive protection has gone digital

Executive protection has gone digital | 2021-01-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Tome las riendas de su responsabilidadesen en la nube.

Tome las riendas de su responsabilidadesen en la nube.

“Pasa a la nube” ha sido la respuesta vez más común en los últimos años para abordar el problema de cómo manejar cantidades masivas de datos. Por un lado, es comprensible, usar infraestructura propiedad de un tercero con equipos dedicados a implementar la seguridad desde su diseño, pruebas continuas y la validación suena atractivo. Sin embargo, lo que muchos no toman en cuenta si bien la infraestructura de terceros está protegida y se prueba con…

Read More

Five Things Security and Development Teams Should Focus on in 2021

Five Things Security and Development Teams Should Focus on in 2021

As we say goodbye to 2020 and spend time reflecting on the industry changes, reassess our workflows and procedures in order to identify where 2021 will bring us, it’s a brilliant time to also address our security practices and ways we can bring improvement to those, as well. After considering the top challenges I saw with development teams and security teams within development environments, I came up with a list of ways to focus our…

Read More

Cisco tags critical security holes in SD-WAN software

Cisco tags critical security holes in SD-WAN software

Cisco has noted and fixed two critical and a number of high-degree vulnerabilities in its SD-WAN software portfolio. Most of the vulnerabilities could let an authenticated attacker execute command injection attacks against an affected device, which could let the attacker utilize root privileges on the device. The first critical problem–with a Common Vulnerability Scoring System rating of 9.9 out of 10–is  vulnerability in the web-based management interface of Cisco SD-WAN vManage Software.  “This vulnerability is due…

Read More

Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 | McAfee Blogs Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 | Mcafee Blog

Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 | McAfee Blogs Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 | Mcafee Blog

Ransomware and DDoS is on the Rise: Tips for Distance Learning in 2021 The holidays have come and gone, and students returned to the virtual classroom. But according to the FBI, cyberattacks are likely to disrupt online learning in the new year. As of December 2020, the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and MS-ISAC continue to receive reports from K-12 educational institutions about the disruptions caused by cyberthreats, primarily ransomware and Distributed Denial…

Read More
1 117 118 119 120 121 268