Threat Actors Capitalize on COVID-19 Vaccine News to Run Campaigns, AWS Abused to Host Malicious PDFs

Threat Actors Capitalize on COVID-19 Vaccine News to Run Campaigns, AWS Abused to Host Malicious PDFs

Key Findings Malicious actors have targeted the vaccine supply chain and leaked materials stolen from the European Medicines Agency (EMA). Phishing campaigns have evolved alongside the pandemic, with the latest observed themes being vaccine-related topics. Users should remain cautious of possible phishing attacks via email, text messages (SMS), or just click through search results. Overview Threat actors change and adapt their campaigns to mirror themes prevalent in the public eye. When they leverage high-urgency trends,…

Read More

AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down

AWS chief Andy Jassy gets top job at Amazon as CEO Bezos steps down

I didn’t see this coming and neither, it appears, did anyone else outside of Amazon’s inner circle. Were you to ask me what major tech CEO might step down in the near futire, I’d have guessed Arvind Krishna at IBM could walk away this year — making room for heir-apparent James Whitehurst. Or maybe at long last Larry Ellison would decide to spend more time on his Hawaiian island, Lanai. But Jeff Bezos, walking away…

Read More

SAN Insights Discovery: The Match-maker tool for SAN – Cisco Blogs

SAN Insights Discovery: The Match-maker tool for SAN – Cisco Blogs

From the dictionary of Oxford:  match·mak·er  /ˈmaCHˌmākər/  a person who arranges relationships and marriages between others, either informally or, in certain cultural communities as a formal occupation. But what is the matchmaker doing here? Well, in the past few years, we have seen new speeds and feeds generating a lot of synergy in the FC storage and FC switching market. It took ~5 years to transition from magnetic spinning discs based storage HDDs to Hybrid…

Read More

Arista embraces segmentation as part of its zero-trust security

Arista embraces segmentation as part of its zero-trust security

Arista has expanded its security software to let customers control authorized network access and communication between groups from the data center to the cloud. The new software, Macro-Segmentation Service (MSS)-Group, expands the company’s MSS security-software family, which currently includes MSS Firewall for setting security policies across customer edge, data-center and campus networks. Additionally, the company’s MSS Host focuses on data-center security policies. MSS software works with Arista Extensible Operating System (EOS) and its overarching CloudVision…

Read More

Medical Researcher Jailed for Selling Secrets to China

Medical Researcher Jailed for Selling Secrets to China

The United States has imprisoned a woman who admitted conspiring with her husband to steal secret research from an Ohio’s children’s hospital and selling the stolen data to China. Hospital researcher Li Chen pleaded guilty in July 2020 to conspiring to commit wire fraud and to stealing scientific trade secrets related to exosomes and exosome isolation from Nationwide Children’s Hospital’s Research Institute for her own personal financial gain.  The 47-year-old former resident of Dublin, Ohio, was yesterday sentenced to…

Read More

Indiana Launches Cyber Blog

Indiana Launches Cyber Blog

The state of Indiana has launched a new blog to promote cybersecurity best practices and share tips on how to stay cyber-safe.  The Indiana Cyber Blog is hosted on the Hoosier State’s Cybersecurity Hub website, where residents can go to report a cybercrime, research cyber training courses and careers, and get the low-down on the latest digital threats. Posts will cover a wide range of topics, including data privacy, identity theft awareness, strong password creation, and how…

Read More

What’s New With Webex: Tools, Devices and Insights Designed for the Future of Work

What’s New With Webex: Tools, Devices and Insights Designed for the Future of Work

The 10x Better Experience for IT series focuses on enhanced data capabilities that empower IT administrators to manage more effectively Enhanced Tools to Drive 10x Better-Than-Being-There Collaboration Experiences Moving into an era where remote work persists and a new hybrid work environment emerges, business leaders have a lot to plan for and worry about. Some of the most common questions I hear from CIOs include: What tools can I use to keep my team connected…

Read More

South Carolina County Still Reeling from January Cyber-Attack

South Carolina County Still Reeling from January Cyber-Attack

The road to recovery is proving to be a long one for a South Carolina county targeted by cyber-attackers last month. Georgetown County’s network was brought down by cyber-criminals on January 23 in what officials described as a “major infrastructure breach.”  While 911 systems and operations at the Georgetown County Detention Center were unaffected by the attack, the county’s electronic systems and email were disrupted.  Ten days after the attack took place, cybersecurity experts are still working…

Read More

The Privileged Credential Security Advantage

The Privileged Credential Security Advantage

By Tony Goulding, Cybersecurity Evangelist at Centrify Over time, a causality has emerged that accounts for the majority of security risks for enterprises: privileged accounts lead to data breaches. So much so that the majority of breaches (over 67 percent) in 2020 were caused by credential theft. Organizations that prioritize privileged credential security have an advantage over their peers by ensuring their operations are more resilient to data breaches. However, there’s a gap that continues…

Read More

End of AireOS Drives Innovation and Customer Opportunities – Cisco Blogs

End of AireOS Drives Innovation and Customer Opportunities – Cisco Blogs

I am sharing this announcement filled with nostalgia of a successful past for the Cisco AireOS WLC and excitement for the multibillion-dollar opportunity that comes with the End of Sale/Life announcement. In 2005, the Cisco AireOS wireless controllers revolutionized the Wi-Fi industry with controller-based architecture. It propelled growth to a $6B industry today and made Cisco a dominant player with leading innovations like Cisco CleanAir technology, Flexible Radio Assignment (FRA), Application Visibility and Control, Software-Defined…

Read More
1 85 86 87 88 89 268