Continue Clean-up of Compromised SolarWinds Software

Continue Clean-up of Compromised SolarWinds Software

Last week, the United States Cybersecurity & Infrastructure Security Agency (CISA) advised on initial steps to take in response to the SolarWinds software that was compromised by advanced persistent threat actors. While federal agencies were under a deadline to complete certain actions, this issue will require continued clean-up and longer-term efforts to mitigate the threat. Staying the course, organizations will want to scan their environments for the presence of the compromised SolarWinds software. There may…

Read More

Breakup Plan for Cyber Command and NSA

Breakup Plan for Cyber Command and NSA

The Trump administration has come up with a proposal to split up the leadership of US Cyber Command and the National Security Agency (NSA). Under the existing “dual-hat” arrangement, the posts of CYBERCOM commander and NSA director are held by one individual. Right now, that person is General Paul Nakasone. The proposal, which could significantly reshape America’s defense policy, was received by the joint chiefs of staff and joint chiefs chairman General Mark Milley at the end of…

Read More

5 minutes with Issak Davidovich – Creating vehicle cybersecurity standards

5 minutes with Issak Davidovich – Creating vehicle cybersecurity standards

5 minutes with Issak Davidovich – Creating vehicle cybersecurity standards | 2020-12-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

McAfee MVISION for Endpoint is FedRAMP Moderate As Federal Cloud Usage Continues to Rise | McAfee Blogs

McAfee MVISION for Endpoint is FedRAMP Moderate As Federal Cloud Usage Continues to Rise | McAfee Blogs

Last month, I discussed the FedRAMP program’s basics and why it’s such a big deal for the federal government. In short, the program protects the data of U.S. citizens in the cloud and promotes the adoption of secure cloud services across the government with a standardized approach. But within the FedRAMP program, there are different authorizations. We’re pleased that McAfee MVISION for Endpoint Access recently achieved FedRAMP Moderate Authorization, which allows users from federal agencies, state and local government,…

Read More

New report examines security threats and risk management trends in 2021

New report examines security threats and risk management trends in 2021

New report examines security threats and risk management trends in 2021 | 2020-12-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

NSA warns hackers are forging cloud authentication information

NSA warns hackers are forging cloud authentication information

NSA warns hackers are forging cloud authentication information | 2020-12-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

‘Twas the Last Class Before Winter Break – Cisco Blogs

‘Twas the Last Class Before Winter Break – Cisco Blogs

A poem for virtual education heroes of 2020  T’was the last class before Winter Break, and all through educator houses  Computers were shutting down, a rest for keyboards and mouses  We’ve earned a holiday break more than ever, time for lights and for cheer  And time to reflect on what was accomplished this year Educators were warriors, the backbone of support our students needed  Who knew educators could rise to this occasion? No doubt, we did.  Classes looked like never before, lesson plans could not have expected  That soon, Webex would be how…

Read More

3 Ways to Adapt Your Cybersecurity Messaging for Generation Z

3 Ways to Adapt Your Cybersecurity Messaging for Generation Z

1. Find the Best Channels to Share Cybersecurity Messaging To keep students informed and updated about issues, EDUCAUSE recommends creating “campus-based information security awareness campaigns.” This means helping students learn what they can do as individuals to keep their devices safe. As effective messaging channels, colleges might consider video and in-person learning opportunities. Corey Seemiller, a researcher and author of Generation Z Goes to College, notes that 90 percent of Gen Z students seek new information…

Read More

The Hidden Costs of Cybercrime on Government | McAfee Blogs

The Hidden Costs of Cybercrime on Government | McAfee Blogs

Organizations across the country – from the private sector to the federal government –  have become more digital, especially following the shift to remote work this year. It’s no surprise that cybercriminals around the world have taken notice. According to a new report by McAfee and the Center for Strategic and International Studies (CSIS), cybercrime is now a nearly trillion-dollar industry, and the government sector is not immune. Across the board, the issue continues to rise –…

Read More

Cisco MDS 9000 and IBM FICON: Just Got Married Again – Cisco Blogs

Cisco MDS 9000 and IBM FICON: Just Got Married Again – Cisco Blogs

We know humans like to celebrate. The wedding date represents a significant one for many couples and there is a tradition to celebrate again, even if with less fanfare, upon reaching a specific amount of years together. Apparently originated from an ancient German tradition, there is also a symbolic name to represent how long ago the wedding occurred. For example, the golden wedding indicates 50 years of marriage. Cisco MDS 9000 series and IBM mainframe…

Read More
1 149 150 151 152 153 268