Improving Your Security Posture with the Pipeline Cybersecurity Initiative

Improving Your Security Posture with the Pipeline Cybersecurity Initiative

A few years ago, I worked alongside some oil commodity traders. Environmental concerns aside, I never realized how many parts were required to get the oil out of the ground, not to mention everything else that finally resulted in the production of refined products that surround our lives. As a cybersecurity professional, I was more interested in how all the pipelines were intertwined and, of course, protected. When the commodity traders asked me to install the…

Read More

Data Classification Is Data Storage – Schemas and Correct Storage

Data Classification Is Data Storage – Schemas and Correct Storage

‘Business’ is a verb that practically means the movement of data. If you aren’t sharing data – keeping the books, sharing ideas and stats about sales, getting the correct information regarding the customer or data to the customer – then you aren’t doing much business. But organizations need to protect their data along the way. Infosec has so many ways of protecting those sources of data, so much so that users of the data often…

Read More

The SolarWinds Orion Breach, and What You Should Know – Cisco Blogs

The SolarWinds Orion Breach, and What You Should Know – Cisco Blogs

What is this? On December 11th, 2020, the U.S. government and the company SolarWinds disclosed a breach into their SolarWinds Orion Platform network management software. This attack was conducted by a sophisticated and likely nation-state based attacker. SolarWinds Orion is a commonly used network management software stack used to manage complex switched and routed IT/OT architectures. High profile customers of the Orion platform are numerous U.S. government agencies, and many private entities. The adversary was…

Read More

The aftermath of the SolarWinds breach: Organizations need to be more vigilant

The aftermath of the SolarWinds breach: Organizations need to be more vigilant

Security experts say organizations are, and should, implement a number of changes ranging from how they vet vendors to handling application updates. Image: Getty Images/iStockphoto The way Nick Fuchs sees it, in the aftermath of the massive SolarWinds breach, there has been one silver lining: A greater understanding of the important role security needs to play in any organization. Not only is there an “obvious opportunity to learn from the event,” but also an awareness…

Read More

The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 1 | McAfee Blogs

The Connected Lives of Babies: Protecting First Footprints in the Digital World, Part 1 | McAfee Blogs

The Connected Lives of Babies: Protecting The First Footprints in the Digital World, Part One A baby can leave their first footprints internet even before they’re born. The fact is that children start creating an identity online before they even put a little pinky on a device, let alone come home for the first time. That “Hello, world!” moment can come much, much sooner. And it will come from you. From posting baby’s ultrasound pic…

Read More

Supporting “anywhere operations” with Cisco HyperFlex Edge and Cisco Intersight – Cisco Blogs

Supporting “anywhere operations” with Cisco HyperFlex Edge and Cisco Intersight – Cisco Blogs

Just like the businesses they support, modern technologies are more distributed than ever before. No longer confined to a single, centralized data center, infrastructure and applications are in branch offices, retail outlets, and remote work sites. They’re spread across private and public cloud environments. And they’re fueling countless edge and IoT capabilities. What’s good for business can be difficult for IT, of course. Managing, supporting, and scaling these distributed systems and workloads can be extremely…

Read More

Cross-AZ charges reduced within VMware Cloud on AWS – VMware Cloud Community

Cross-AZ charges reduced within VMware Cloud on AWS – VMware Cloud Community

Over the past three years of continuous operations, we have relentlessly optimized and improved the VMware Cloud on AWS service. Today we’re ecstatic to announce that we’ve effectively removed Stretched Cluster Cross-AZ charges from within the service. Why the change? A little over a year ago, we reduced the price of Cross-AZ charges by 95%. With three years of customer data to review, we’ve determined that we can relax 100% of the charges for our customers….

Read More

FBI warns of voice phishing attacks targeting employees at large companies

FBI warns of voice phishing attacks targeting employees at large companies

Using VoIP calls, the attackers trick people into logging into phishing sites as a way to steal their usernames and passwords. Image: Getty Images/iStockphoto The FBI is cautioning companies to beware of a slew of voice phishing attacks aimed at capturing the login credentials of employees. SEE: Social engineering: A cheat sheet for business professionals (free PDF) (TechRepublic)  In an advisory released last Thursday, the FBI revealed that as of December 2019, cybercriminals have been working together…

Read More

10 trends shaping the security industry in 2021

10 trends shaping the security industry in 2021

Increased use of edge computing could “put AI everywhere,” according to Hikvision’s trends roundup. Image: iStock/ismagilov In recent months, there’s been a surge in cybersecurity attacks as criminals seek to exploit the coronavirus pandemic, the vulnerabilities of a remote workforce, and more. As details continue to emerge from the massive SolarWinds hack and fallout, many organizations are assessing their cybersecurity capabilities. On Jan. 7, Hikvision released a report outlining 10 of the top security trends…

Read More

MAZE Exfiltration Tactic Widely Adopted

MAZE Exfiltration Tactic Widely Adopted

New research by New Zealand company Emsisoft has found that a cyber-blackmail tactic first debuted by ransomware gang MAZE has been adopted by over a dozen other criminal cyber-gangs. The internationally renowned security software company declared a ransomware crisis in the last month of 2019. Their latest ransomware report shows that this particular type of malware has had a huge impact on the United States in 2020. Emsisoft threat analyst Brett Callow described the numbers in “The…

Read More
1 120 121 122 123 124 268