National Computer Security Day: Tips for securing your home computers

National Computer Security Day: Tips for securing your home computers

Tuesday, November 30th, is National Computer Security Day.  Although this special day has been around since 1988, many people are not only unaware of it, but are still also unaware of some of the basic security required for protecting their computing devices. The rise of remote work has stretched the security perimeters of all corporations, and fortunately, there are products, such as Tripwire Enterprise that can help them to protect the organization, from the full…

Read More

Cloud flexibility AND on-premises control – learn what’s new with VMware Cloud on Dell EMC

Cloud flexibility AND on-premises control – learn what’s new with VMware Cloud on Dell EMC

VMware Cloud on Dell EMC is a Local Cloud solution that combines the simplicity and agility of the public cloud with the security and control of on-premises infrastructure, delivered as-a-service and fully managed by VMware. Customers are freed from the burden of managing infrastructure, can accelerate application delivery and maintain the appropriate control to satisfy stringent data sovereignty, security, cost, and performance requirements. No wonder customer adoption for Local Cloud continues to gather momentum and…

Read More

SOAR Into More Integrated Cybersecurity

SOAR Into More Integrated Cybersecurity

By Josh Magady, Section Manager, Senior Cybersecurity Consultant, and Practice Technical Lead, 1898 & Co. Why is being cybersecurity compliant not the same as preparedness for threats? Shouldn’t compliance mean full coverage against all current and future threats? Compliancy builds in a checklist mentality. A company measures their compliance compared to certain standards like NERC CIP and HIPAA for example but, they can’t account for a company’s environment. They are intended as a starting point. The problem for organizations is when they stop with…

Read More

Top 10 AWS Security Misconfiguration

Top 10 AWS Security Misconfiguration

Swift cloud adoptions spurred on by the global pandemic has led to oversights, errors, or ill-informed cloud service configuration choices (commonly referred to misconfigurations). You may have heard that securing the cloud can be complex, but something as “simple” to stop as a misconfiguration can ultimately lead to the unintended exposure of mission-critical information and assets. Major cosmetic retailer, Estee Lauder, experienced a major breach due to a misconfiguration, resulting in more than 440 million…

Read More

Enterprise Strategy Group Verifies Valuation of XDR Solutions

Enterprise Strategy Group Verifies Valuation of XDR Solutions

  Why XDR It’s been established that EDR doesn’t do enough to detect threats—it is, after all only on the endpoint and over 90% of threats enter the enterprise through email and other avenues. And while many respondents considered SIEM their most valuable tool for threat detection and response, they also faced many challenges with it. Namely, 57% said they had operation and resource issues, 58% noted there was room for improvement with upfront correlation…

Read More

What You Can Do to Mitigate Cloud Misconfigurations

What You Can Do to Mitigate Cloud Misconfigurations

Our data also showed a high frequency of Amazon Simple Storage Service (S3) rule violations. Still, it is necessary to examine the data further before fearing for the worst. For one, not all Amazon S3 buckets are supposed to be encrypted. In some instances, encryption is not needed. These are cases where the data needs to be served in clear text such as for public sites or data that needs to be openly accessed through…

Read More

News from AWS re:Invent – Docker Official Images on Amazon ECR Public – Docker Blog

News from AWS re:Invent – Docker Official Images on Amazon ECR Public – Docker Blog

We are happy to announce today that, in partnership with Amazon, Docker Official Images are now available on AWS ECR Public. This is especially exciting because Docker Official Images are some of the most popularly used images on Docker Hub, acting as a key and trusted starting point for base images for the entire container ecosystem. Having them available on ECR Public, in addition to Docker Hub, makes it easier for Amazon customers to use…

Read More

How to Help Your Kids Combat Clickbait Scams

How to Help Your Kids Combat Clickbait Scams

We’ve all fallen for clickbait. Sometimes it’s a juicy headline designed to spark curiosity and drive traffic to a specific website. Other times it’s a quiz that will magically reveal your celebrity look-alike. While the innocent click connected to most clickbait is seemingly harmless, some clickbait can install dangerous malware onto your devices.  According to the FBI’s Crime Complaint Center’s 2020 Internet Crime Report, internet crime increased by 300,000 complaints from 2019 to 2020. This statistic represents a 50 percent increase…

Read More

Social Engineering: Tis the Season for Tricky Hackers

Social Engineering: Tis the Season for Tricky Hackers

With the holidays on the horizon, spirits are high—and it’s those same high spirits that hackers want to exploit. ‘Tis the season for clever social engineering attacks that play on your emotions, designed to trick you into giving up personal info or access to your accounts.   Social engineering attacks unfold much like a confidence scam. A crook takes advantage of someone’s trust, applies a little human psychology to further fool the victim, and then pulls off a theft. Online, a social engineering attack will likely involve a theft attempt of personal or account information that the crook can…

Read More

Social Engineering: Tis the Season for Tricky Hackers

Social Engineering: Tis the Season for Tricky Hackers

With the holidays on the horizon, spirits are high—and it’s those same high spirits that hackers want to exploit. ‘Tis the season for clever social engineering attacks that play on your emotions, designed to trick you into giving up personal info or access to your accounts.   Social engineering attacks unfold much like a confidence scam. A crook takes advantage of someone’s trust, applies a little human psychology to further fool the victim, and then pulls off a theft. Online, a social engineering attack will likely involve a theft attempt of personal or account information that the crook can…

Read More
1 2,131 2,132 2,133 2,134 2,135 2,763