SolarWinds roundup: Fixes, new bad actors, and the company knew

SolarWinds roundup: Fixes, new bad actors, and the company knew

The SolarWinds Orion security breach is unfolding at a rapid pace and the number of vendors and victims continues to grow. Each day brings new revelations as to its reach and depth. Of particular concern is the rate of infection and impact on government systems. In case you missed it, a backdoor was found in the SolarWinds Orion IT monitoring and management software. A dynamic link library called SolarWinds.Orion.Core.BusinessLayer.dll, a SolarWinds digitally-signed component of the…

Read More

SolarWinds roundup: Fixes, new bad actors, and what the company knew

SolarWinds roundup: Fixes, new bad actors, and the company knew

The SolarWinds Orion security breach is unfolding at a rapid pace, and the number of vendors and victims continues to grow. Each day brings new revelations as to its reach and depth. Of particular concern are the rate of infection and impact on government systems. In case you missed it, a backdoor was found in the SolarWinds Orion IT monitoring and management software. A dynamic link library called SolarWinds.Orion.Core.BusinessLayer.dll, a SolarWinds digitally-signed component of the…

Read More

5 minutes with Ali Golshan – The benefits of DevOps

5 minutes with Ali Golshan – The benefits of DevOps

5 minutes with Ali Golshan – The benefits of DevOps | 2020-12-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Cyber Insurance Market Expected to Surge in 2021

Cyber Insurance Market Expected to Surge in 2021

The global cyber insurance market is projected to grow by 21% next year, reaching $9.5bn in value, according to new data by insurance firm Finaria.it. This is as a result of greater recognition of the increasing cyber-threat landscape, exacerbated by the shift to remote working this year. Finaria added that the cyber insurance market is expected to reach $20.4bn by 2025, as more organizations look to protect themselves from malicious actors. In its analysis, the…

Read More

SASE check list: 7 key evaluation criteria

SASE check list: 7 key evaluation criteria

The marriage of networking and security into the secure-access service edge stands to improve application performance, reduce infrastructure complexity, and protect sensitive data, and as such SASE is an attractive architecture for enterprises large and small. Due to the newness of SASE offerings, though, providers are still building and refining the features of their services, so available offerings are complex, often incomplete and require integration with customer organizations’ existing network and security architectures. Vendors of…

Read More

Leaky Server Exposes 12 Million Healthcare Records to Meow Attacker

Leaky Server Exposes 12 Million Healthcare Records to Meow Attacker

A healthcare technology company leaked 12 million records on patients including highly sensitive diagnoses, before the exposed cloud server was struck by the infamous “meow” attacker, researchers have revealed. A team at SafetyDetectives led by Anurag Sen discovered the leaky Elasticsearch server in late October after a routine IP address scan, although it’s unknown how long the data was exposed for before that. It was traced back to Vietnamese tech firm Innovative Solution for Healthcare…

Read More

Web Page Layout Can Trick Users into Divulging More Info

Web Page Layout Can Trick Users into Divulging More Info

Computer users can be manipulated into divulging more information than they would normally simply by the layout of webpages, new research has revealed. A team at Israel’s Ben-Gurion University of the Negev (BGU) presented its study, Online Disclosure Depends on How You Ask for Information, at the International Conference on Information Systems last week. They examined the behavior of 2504 users who were asked to provide their country, full name, phone number, and email address…

Read More

US: Buying Chinese Tech is a “Grave Threat” to Your Data Security

US: Buying Chinese Tech is a “Grave Threat” to Your Data Security

The US government has urged domestic businesses not to invest in Chinese IT kit or data services over fears companies there will be coerced by the Communist Party into enabling cyber-espionage. The business advisory from the Department of Homeland Security (DHS) clarified what many have known for some time: that the People’s Republic of China (PRC) is on a mission to become self-sufficient in technology and a global tech superpower over the coming decades. A…

Read More

The ultimate guide to modern video business surveillance systems in 2021

The ultimate guide to modern video business surveillance systems in 2021

The ultimate guide to modern video business surveillance systems in 2021 | 2020-12-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Future-proofing data against hackers

Future-proofing data against hackers

Future-proofing data against hackers | 2020-12-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 144 145 146 147 148 268