Executive Spotlight: Q&A with EMEA Senior Vice President, Adam Philpott

Executive Spotlight: Q&A with EMEA Senior Vice President, Adam Philpott

Welcome back to our executive blog series, where we’re sitting down with some of the pivotal players behind McAfee Enterprise to hear their takes on today’s security trends, challenges, and opportunities for enterprises across the globe. Q: Do you have a role model? If so, who is it? Well, there are work and there are more personal role models. At work, I have several past and present role models I’ve met across my career that…

Read More

FBI and CISA warn that cybercriminals don’t take holidays

FBI and CISA warn that cybercriminals don’t take holidays

The FBI and CISA (the Cybersecurity and Infrastructure Security Agency) have jointly issued an advisory to organisations, warning about an increase in the number of attacks coinciding with weekends and holidays. With the Labor Day weekend rapidly approaching, the agencies have reminded businesses to be especially vigilant, remain diligent about their network defences, and “engage in preemptive threat hunting on their networks to search for signs of threat actors.” To underline their point, the FBI…

Read More

What Is a Cyber Fusion Center? | Anomali

What Is a Cyber Fusion Center? | Anomali

Drive Organization-Wide Visibility, Reduce Time to Detection, and Protect Critical Assets With a Cyber Fusion Center The continual and evolving threats to information systems are a constant battle that prompted the creation of cyber intelligence analysts who provide contextualized data, information, and intelligence to those tasked with detecting and defending against attacks. Cyber defense systems need to become more responsive to internal vulnerabilities and adapt to external threats as attack methods evolve more quickly. It…

Read More

WhatsApp Fined €225m for GDPR Violations

WhatsApp Fined €225m for GDPR Violations

WhatsApp has been hit by a €225m fine by Ireland’s Data Protection Commission (DPC) for failing to discharge GDPR transparency obligations. The DPC made the announcement today following the conclusion of an investigation that began in December 2018. This examined whether the popular messaging app “has discharged its GDPR transparency obligations with regard to the provision of information and the transparency of that information to both users and non-users of its service.” This includes information…

Read More

FBI and CISA warn of potential cyberattacks this holiday weekend, citing past trends

FBI and CISA warn of potential cyberattacks this holiday weekend, citing past trends

The Labor Day holiday could be prime time for more than just barbecues and closing the pool for the year as the open season on ransomware continues. Image: GettyImages/Petri Oeschger In recent months, cyberattacks have crossed through the digital ether with very real implications in our physical reality, as online criminals send shockwaves through critical aspects of U.S. infrastructure ranging from domestic petroleum and meat production to local water treatment facilities. On Tuesday, the FBI…

Read More

Emerging technology, evolving threats — Part II: The asymmetry effect

Emerging technology, evolving threats — Part II: The asymmetry effect

Emerging technology, evolving threats — Part II: The asymmetry effect | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Tripwire Patch Priority Index for August 2021 | The State of Security

Tripwire Patch Priority Index for August 2021 | The State of Security

Tripwire’s August 2021 Patch Priority Index (PPI) brings together important vulnerabilities from Microsoft. First on the patch priority list this month are patches for Microsoft Exchange Server (CVE-2021-34523, CVE-2021-34473, CVE-2021-31207). These vulnerabilities have seen active exploitation. Also, exploits for these vulnerabilities have been recently added to the Metasploit Exploit Framework. These systems should be patched as soon as possible. Following Exchange, there is a patch available for a Windows LSA spoofing vulnerability. This vulnerability has…

Read More

UK Researchers Invent Device to Thwart USB Malware

UK Researchers Invent Device to Thwart USB Malware

A team of researchers at a UK university have designed a new device, which they claim will mitigate the risk of malicious USB drives. The “external scanning device” was designed at Liverpool Hope University and will soon go into production, having been granted a patent by the Indian government. It has been engineered to overcome a major issue with operating systems — that if not configured correctly, they will trust all USBs regardless of what…

Read More

Bad Bots Focus Attacks on E-Commerce Targets

Bad Bots Focus Attacks on E-Commerce Targets

Nearly two-fifths (39%) of all internet traffic is comprised of “bad bot” activity, with e-commerce assets most at risk of attack, according to a new report from Barracuda Networks. The security vendor’s Bot attacks: Top Threats and Trends report revealed that automated traffic accounts for the vast majority (64%) of all internet traffic today — including search engine crawlers and social media bots. However, only a quarter (25%) of this can be labelled “good bot”…

Read More

Application Transformer now in Preview for VMware Cloud on AWS

Application Transformer now in Preview for VMware Cloud on AWS

Application Modernization Challenges Application modernization is top of mind for all enterprises that want to deliver value to their customers quickly. However, for most organizations, the path to application modernization is slow, complex, expensive and requires a breadth of technical skills given the volume, variety, and complexity of an organization’s digital portfolio. Lack of visibility into existing systems makes mapping existing VM inventory and its application dependencies, a tedious and manual process. Additionally, with the…

Read More
1 2,120 2,121 2,122 2,123 2,124 2,599