It’s All About You: McAfee’s New All-Consumer Focus

It’s All About You: McAfee’s New All-Consumer Focus

This week, McAfee took an exciting new step in our journey—we are now a pure-play consumer company. What does that mean for consumers? It means that McAfee will be able to focus 100% of our talent and expertise on innovation and development that directly enables and improves the products and services that protect you and your family.  It’s the right time to take that step. Today, we use technology in every aspect of our lives, from education to recreation and entertainment to transportation. We…

Read More

Cloud Compliance Best Practices: A Quick Overview

Cloud Compliance Best Practices: A Quick Overview

Cloud compliance is more important than ever, especially as businesses and organizations continue to engage in remote and digital work practices due to COVID-19. Even before the pandemic, more and more companies were migrating to the cloud.  But what exactly is cloud compliance, and what are some best practices you should keep in mind if you’re shopping for a provider or looking to enhance your current computing system? Cloud compliance refers to the need for…

Read More

The Next Disruptive ICS Attack: 3 Likely Sources for Major Disruptions

The Next Disruptive ICS Attack: 3 Likely Sources for Major Disruptions

Faced with rows of empty gas pumps, many Americans on the East Coast may be wondering why this happened, whether it will happen again, or if there is anything we can do to avoid future catastrophe. The unpleasant truth of the matter is that this will certainly not be the last time society is disrupted […]… Read More The post The Next Disruptive ICS Attack: 3 Likely Sources for Major Disruptions appeared first on The State…

Read More

Hackers posed as flirtatious UK aerobics instructor while targeting US defense contractor’s employee

Hackers posed as flirtatious UK aerobics instructor while targeting US defense contractor’s employee

Cybersecurity researchers said that hackers with ties to the Iranian government targeted U.S. defense contractors in attempts to install malware, including by posing as a United Kingdom-based aerobics instructor.  Security software firm Proofpoint said in a Wednesday report that researchers had identified “a years-long social engineering and targeted malware campaign by the Iranian-state aligned threat actor TA456,” also known as “Tortoiseshell.”  The California-based cybersecurity firm said that “TA456 built a relationship across corporate and personal communication platforms with…

Read More

Cloud incident response demands cloud native capabilities

Cloud incident response demands cloud native capabilities

Cloud incident response demands cloud native capabilities | 2021-07-27 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

5 minutes with Tim Danks – Global collaboration in cyber risk management is needed

5 minutes with Tim Danks – Global collaboration in cyber risk management is needed

5 minutes with Tim Danks – Global collaboration in cyber risk management is needed | 2021-07-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Information security: Developing practical policies and procedures

Information security: Developing practical policies and procedures

Information security: Developing practical policies and procedures | 2021-07-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Race Ahead to Kubernetes: A Learning Path for System Administrators – VMware Cloud Community

Race Ahead to Kubernetes: A Learning Path for System Administrators – VMware Cloud Community

Kubernetes has quickly emerged as one of the leading cloud technologies—and for good reason. Kubernetes makes it possible to deploy modern applications that are scalable, modular, and fault-tolerant. You declare the state you need your environment to be in and it constantly works to maintain that state, which frees up teams from manual tasks around infrastructure management. While Kubernetes has been popular with developers for a number of years, it’s now moving steadily into production…

Read More

Frequently asked questions on Extended Detection and Response

Frequently asked questions on Extended Detection and Response

This article answers a few of the more common questions from those who are trying to figure out the XDR space. Image: iStock/LeoWolfert As is expected with any new market segment or capability, questions about extended detection and response (XDR) abound. This article answers a few of the more common questions from those that are trying to figure this space out.  What Is XDR?  An incredibly simplified way of thinking about XDR is that it…

Read More

Back-to-Basics: Use Strong Passwords

Back-to-Basics: Use Strong Passwords

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More
1 2,172 2,173 2,174 2,175 2,176 2,590