NCA and Europol Formalize Cooperation on Cybercrime

NCA and Europol Formalize Cooperation on Cybercrime

Crime-fighters in Europe and the UK have signed a new agreement to boost cooperation on cybercrime and other investigations. The working agreement between the UK’s National Crime Agency (NCA), which investigates serious and organized crimes, and Europol will sit under the UK-EU trade and cooperation agreement (TCA). That’s the limited post-Brexit free trade agreement between the two parties signed at the end of 2020. Although the NCA claimed that “operational cooperation” between the two had…

Read More

Infant Fatality Could Be First Recorded Ransomware Death

Infant Fatality Could Be First Recorded Ransomware Death

A tragic case making its way through the courts in the US could prove to be the first recorded death due to ransomware. According to papers filed in June 2020 (via NBC), Teiranni Kidd of Mobile, Alabama, is accusing Springhill Memorial Hospital and its owners of failing to mitigate a crippling cyber-attack and then conspiring to hide its impact on patient care. Kidd’s daughter Nicko was born with her umbilical cord wrapped around her neck, a problem…

Read More

Thinking like a hacker: Protect your company from cyberattacks

Thinking like a hacker: Protect your company from cyberattacks

Thinking like a hacker: Protect your company from cyberattacks This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

How to address data-privacy risks created by remote and hybrid work

How to address data-privacy risks created by remote and hybrid work

How to address data-privacy risks created by remote and hybrid work This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Scammers Capitalize on Release of New Bond Movie

Scammers Capitalize on Release of New Bond Movie

The long-awaited release of the new James Bond movie is being exploited by cyber-criminals, according to cybersecurity company Kaspersky.  No Time to Die is actor Daniel Craig’s fifth and final fling with the internationally renowned 007 spy character created by author Ian Fleming. Bond first entered the public consciousness in 1952 with the publication of Fleming’s novel Casino Royale.  The big-screen adaptation of Casino Royale, which came out in 2006, was the first James Bond film…

Read More

How to install the Nessus vulnerability scanner on Rocky Linux

How to install the Nessus vulnerability scanner on Rocky Linux

If you’re looking for one of the best vulnerability scanners on the market, Nessus might be the ticket. Jack Wallen shows you how to install this platform on Rocky Linux. Image: Gorodenkoff/Shutterstock Nessus is a very popular vulnerability scanner used by tens of thousands of organizations across the globe. And although Nessus doesn’t prevent attacks, it does a fantastic job of checking for vulnerabilities and loopholes in your company’s infrastructure.  With the help of this…

Read More

Coast Guard is Commissioning Cyber Talent

Coast Guard is Commissioning Cyber Talent

The United States Coast Guard has launched a new program that gives cyber professionals the chance to become Coast Guard Cyber Officers.  With the launch of the Direct Commission Cyber Officer (DCCO) program, the maritime security branch of the United States military is hoping to attract top cyber talent to work in cyberspace operations, information assurance, cyber threat intelligence, and cybersecurity. The program is open to “high-performing cyber professionals” with “robust work experience” and “military members with…

Read More

Windows Server 2022: A cheat sheet

Windows Server 2022: A cheat sheet

Microsoft has just released its most recent Windows Server platform. Check out the improved hybrid cloud features, beefed up security and improved support for large on-premises applications. Image: Stephen Brashear, Getty Images The latest version of the long-term support release of Windows Server, Windows Server 2022, is now available. It’s perhaps best thought of as a continuing evolution of the series of releases that started with Windows Server 2016, enhancing security, adding improved hybrid cloud…

Read More

Introducing Cloud Camp by VMware – Cloud Blog – VMware

Introducing Cloud Camp by VMware – Cloud Blog – VMware

You’ve likely attended a camp to learn something you were interested in, like art, basketball, or band. Many camps also have a related area of focus like coding. Camps provide a way to learn, interact, and gain support based on common interests. Today I’m excited to announce a new kind of camp, Cloud Camp by VMware. It’s here to get you started and through your cloud journey! Cloud Camp by VMware is available to all…

Read More

Dell announces new ProSupport Suite and AI-powered Trusted Device capabilities

Dell announces new ProSupport Suite and AI-powered Trusted Device capabilities

Both could help businesses struggling to secure remote workforces and protect ever-increasing vulnerability footprints. Image: 1550539, Getty Images/iStockPhoto Dell has announced new features for its ProSupport Suite IT software, and new AI-powered Trusted Device security capabilities, both of which should make businesses with large pools of remote workers take notice. If what Dell announced is accurate, these new capabilities could make management of remote hardware — and the people who use it — much simpler. …

Read More
1 2,091 2,092 2,093 2,094 2,095 2,617