Sacked Employee Deletes 21GB of Credit Union Files

Sacked Employee Deletes 21GB of Credit Union Files

A former credit union employee is facing a decade behind bars after pleading guilty to destroying large amounts of corporate data in revenge for being fired. Juliana Barile, 35, of Brooklyn, submitted the plea at a federal court in Brooklyn on Tuesday, admitting to one count of computer intrusion arising from her “unauthorized intrusion into, and destruction of data” on her former employer’s computer system. Two days after being fired on May 19 2021, Barile…

Read More

The human factor in cybersecurity

The human factor in cybersecurity

The human factor in cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Five trends complicating industrial automation cybersecurity and how a standards-based approach is the solution

Five trends complicating industrial automation cybersecurity and how a standards-based approach is the solution

Five trends complicating industrial automation cybersecurity and how a standards-based approach is the solution | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

CISOs are changing their ways amid their toughest environment ever

CISOs are changing their ways amid their toughest environment ever

CISOs are changing their ways amid their toughest environment ever | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Let’s help developers address open source software security

Let’s help developers address open source software security

Let’s help developers address open source software security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Factors You Should Consider for an Optimal Hybrid Cloud Strategy

Factors You Should Consider for an Optimal Hybrid Cloud Strategy

Cloud technology is a powerful tool with unmeasurable potential. Across the globe, companies are harnessing the cloud to propel their business solutions. However, there are always some companies that cannot entirely shift their solutions to the cloud. Thanks to the hybrid cloud model, companies house some of their solutions on their on-premises servers and store the rest of them in the cloud. Most companies have adopted the hybrid cloud model, as it suits both conventional…

Read More

CIS Control 2: Inventory and Control of Software Assets

CIS Control 2: Inventory and Control of Software Assets

Today, I will be going over CIS Control 2 from version 8 of the top 18 CIS Controls – Inventory and Control of Software Assets. Version 7 of CIS Controls had 10 requirements, but in version 8, it’s simplified down to seven safeguards. I will go over those safeguards and offer my thoughts on what I’ve found. Key Takeaways for Control 2 Reusability. The tools that were mentioned in CIS Control 1 will also be…

Read More

Australian Couple Admits “Serious Cyber Hacking Offenses”

Australian Couple Admits “Serious Cyber Hacking Offenses”

An Australian couple has admitted stealing personally identifiable information (PII) and using it to commit money laundering and deception offenses that netted them millions of dollars. Jason Bran Lees, aged 33, and Emily Jane Walker, aged 29, were arrested in Adelaide in February 2020 along with a then 31-year-old unidentified co-conspirator who had moved from Adelaide to Sydney.  The couple has since pleaded guilty to dozens of charges, including dishonest dealings with documents and being in possession…

Read More

Looking Back at Executive Order on Cybersecurity and What it Means for Your Business

Looking Back at Executive Order on Cybersecurity and What it Means for Your Business

By James Gorman, CISO of AuthX On May 12, 2021, President Biden issued an Executive Order focused on improving the nation’s cybersecurity. This executive order strives to accomplish several important objectives for the United States’ approach to safeguarding its data and systems. Create a Zero Trust environment Manage the supply chain and its vulnerabilities Minimize barriers to intelligence sharing Create a Safety Review Board Create a standardized playbook for Incident Response The key outcomes for US cybersecurity procedures from this executive order include: Developing a Zero Trust environment. This insight can apply to any organization, regardless of industry or size. Incorporating just this one element will lead…

Read More

SAP HANA SECURITY Solution Acquired by XYPRO

SAP HANA SECURITY Solution Acquired by XYPRO

Cybersecurity company XYPRO Technology Corporation has acquired a critical security and compliance monitoring platform for SAP HANA and Linux environments from Hewlett Packard Enterprise (HPE). The acquisition of Workload Aware Security (WASL) was announced on Tuesday along with the news that HPE will continue to sell and distribute the WASL tool.  XYPRO said the deal would bring its mission-critical security expertise to the Open Systems and SAP HANA markets and customers. The company added that while it will…

Read More
1 2,121 2,122 2,123 2,124 2,125 2,599