Ransomware is Evolving – Agencies Must Prioritize Data Backup

Ransomware is Evolving – Agencies Must Prioritize Data Backup

By Nick Psaki, Principal Engineer, Office of the CTO, Pure Storage The threat of ransomware is not new – but we are seeing a renewed focus since the onset of COVID-19. With the majority of the Federal workforce remote, the landscape is changing rapidly and threats are evolving. The Cybersecurity and Infrastructure Security Agency (CISA) – along with other agencies – has released several alerts since the beginning of the pandemic, citing new and emerging…

Read More

PCI Secure SLC Program Expands Vendor Eligibility with Version 1.1

PCI Secure SLC Program Expands Vendor Eligibility with Version 1.1

Today, the PCI Security Standards Council (PCI SSC) published version 1.1 of the PCI Secure Software Lifecycle (SLC) Standard and its supporting program documentation. The PCI Secure SLC Standard is one of two standards that are part of the PCI Software Security Framework (SSF). It provides security requirements and assessment procedures for software vendors to integrate into their software development lifecycles and to validate that secure lifecycle management practices are in place.

Read More

How to fix Wi-Fi interference

How to fix Wi-Fi interference

Since Wi-Fi transmits over the airwaves, it’s of course much more susceptible to interference than the wired network. There can be interference from your own network or neighbor’s, non-Wi-Fi wireless devices, microwaves, and even radar systems. Since there are so many possibilities, tracking down or fixing the interference can be quite a task, but knowing where to start can help. The symptoms of interference issues can easily be mistaken for symptoms of other, more apparent…

Read More

Software Firm Owner Admits Fraud and CSAM Possession

Software Firm Owner Admits Fraud and CSAM Possession

The owner of two companies based in Virginia has pleaded guilty to orchestrating a million-dollar fraud scheme, engaging in unlawful monetary transactions, and receipt of child sexual abuse material (CSAM).  Gordon G. Miller III, of Glen Allen, is the sole owner and operator of software engineering company G3 Systems Inc. and self-described venture capital company G3i Ventures LLC.  According to court documents, the 56-year-old started engaging in multiple fraud schemes starting around 2017 to prevent…

Read More

Drive the Security Conversation — Outcomes to Consider – Cisco Blogs

Drive the Security Conversation — Outcomes to Consider – Cisco Blogs

As a #CiscoSecurePartner I’m sure we can all agree that without a doubt 2020 will go down in history, not only for all the obvious reasons, but also because organizations around the world were forced to consider and adopt rapid digital transformation.  How did our customers minimize the impact of this dramatic shift to remote work on their operations? With the right investments they maintained an agile security infrastructure, supported in role-based training, and kept…

Read More

California DMV Halts Data Transfers After Vendor Breach

California DMV Halts Data Transfers After Vendor Breach

A recent cyber-attack on a company based in Seattle, Washington, may have compromised the data of millions of drivers residing in California. The California Department of Motor Vehicles has contracted with Automatic Funds Transfer Services, Inc. (AFTS) since 2019 to cross-reference addresses with the national database as part of a process to ensure the addresses to which vehicle registration renewal notices are mailed are correct.  According to a statement released by the DMV on Wednesday,…

Read More

Cybersecurity needs to be proactive with involvement from business leaders

Cybersecurity needs to be proactive with involvement from business leaders

In a webinar Wednesday, former US Homeland Security director Christopher Krebs also suggested organizations have COVID workforce coordinators and that cloud mail providers activate MFA by default. Image: iStockphoto/Metamorworks Effective CISOs and other leaders are those who plan for today but with an eye on tomorrow, and always put people first, according to Christopher Krebs, former director of the Department of Homeland Security’s cybersecurity and infrastructure agency. “You always have to be agile around how…

Read More

US Jails Celebrated Nigerian Entrepreneur for Cyber-Fraud

US Jails Celebrated Nigerian Entrepreneur for Cyber-Fraud

A Nigerian entrepreneur who was nominated for Africa’s most prestigious award for businessmen has been imprisoned in the United States for masterminding a multimillion-dollar cyber-fraud scheme.  Obinwanne Okeke headed a criminal team that used email-based cyber-attacks to steal credentials from hundreds of victims from approximately 2015 to 2019. The data they swiped was used to target companies with fraudulent wire-transfer requests and fake invoices.  British company Unatrac Holding Limited, the export sales office for American…

Read More

Kia Motors allegedly suffers ransomware attack; cybercriminals demand $20 million to recover sensitive data

Kia Motors allegedly suffers ransomware attack; cybercriminals demand  million to recover sensitive data

Kia Motors allegedly suffers ransomware attack; cybercriminals demand $20 million to recover sensitive data | 2021-02-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Spend a Moment and Look Yourself in the Social Justice Mirror – Cisco Blogs

Spend a Moment and Look Yourself in the Social Justice Mirror – Cisco Blogs

“Striving for social justice is the most valuable thing to do in life.” – Albert Einstein It might be surprising to some people that Albert Einstein, one of my science idols, was also a vocal advocate for social justice. But when you understand that he was Jewish and the target of antisemitism in both Europe and America, you can understand why he used his platform as a celebrity physicist to draw attention to social injustice….

Read More
1 45 46 47 48 49 268