Vaccine passports have to be consistent so that all countries can recognize them, expert says

Vaccine passports have to be consistent so that all countries can recognize them, expert says

This might create problems for those from poorer countries. Their countries may not have the resources to create vaccine passports that are readable everywhere. TechRepublic’s Karen Roby spoke with Marc Rogers, executive director for cybersecurity at Okta, about vaccine passports. The following is an edited transcript of their conversation. Karen Roby: Marc, obviously, we’ve talked to you many times in the past regarding ransomware and pretty much every other security issue. Today, though, a hot…

Read More

US DoJ indicts four members of China-linked APT40 cyberespionage group

US DoJ indicts four members of China-linked APT40 cyberespionage group

US DoJ indicted four members of the China-linked cyberespionage group known as APT40 for hacking various entities between 2011 and 2018. The U.S. Justice Department (DoJ) indicted four members of the China-linked cyber espionage group APT40 (aka TEMP.Periscope, TEMP.Jumper, and Leviathan) for hacking tens of government organizations, private businesses and universities around the world between 2011 and 2018. “The defendants and their Hainan State Security Department (HSSD) conspirators sought to obfuscate the Chinese government’s role in such theft by establishing…

Read More

Top 5 things to know about supply chain attacks

Top 5 things to know about supply chain attacks

Worried about supply chain attacks? Tom Merritt can help you understand your risk. Whether its Stuxnet, SolarWinds or Microsoft Exchange, chances are you’ve read about supply chain attacks. But, hey, you follow all the security procedures right? You’re not going to get targeted, right? Hmm. Here are five things to know about supply chain attacks. It doesn’t target you. It targets your suppliers. Hence the name. You trust your suppliers so you let them in…

Read More

No, You Don’t Need EDR

No, You Don’t Need EDR

By Daniel Petrillo , Director of Security Strategy, Morphisec Endpoint detection and response (EDR) solutions, and their evolution — extended detection and response (XDR) platforms — are increasingly popular. To underscore that point, the market was valued at $1.81 billion in 2020, according to Mordor Intelligence, and looks to increase to $6.9 billion by 2026 for a CAGR of 25.6% over the next five years. This is huge as more companies start to look into…

Read More

Your iPhone and the Pegasus spyware hack: What you need to know

Your iPhone and the Pegasus spyware hack: What you need to know

iPhones have been compromised by the NSO Group’s Pegasus spyware. Should you be worried? That depends on who you ask. Image: James Martin/CNET The iPhone has always been lauded for its tight security and privacy controls, especially compared with Android devices. But that reputation took a hit this week with the revelation that a spyware program ostensibly used to hack into the phones of criminals and terrorists was abused by certain authoritarian governments to compromise…

Read More

Extended Detection and Response (XDR) Needs a New Kill Chain

Extended Detection and Response (XDR) Needs a New Kill Chain

When it comes to spotting and defeating today’s advanced cyberattacks, the predominant kill chains used in security products clearly aren’t up to the task. New attacks occur every day, and they are increasingly creative and complex. For example, the SolarWinds hack targeted a user’s email, then used that ID to navigate the company’s network, and then installed malware in the outbound software update server that gave the hackers access to every SolarWinds customer’s network. Kill…

Read More

Level Up Security with Scoped Access Tokens – Docker Blog

Level Up Security with Scoped Access Tokens – Docker Blog

Scoped tokens are here 💪! Scopes give you more fine grained control over what access your tokens have to your content and other public content on Docker Hub!  It’s been a while since we first introduced tokens into Docker Hub (back in 2019!) and we are now excited to say that we have added the ability for accounts on a Pro or Team plan to apply scopes to their Personal Access Tokens (PATs) as a…

Read More

Back-to-Basics: Reduce Where Payment Data Can Be Found

Back-to-Basics: Reduce Where Payment Data Can Be Found

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More
1 2,179 2,180 2,181 2,182 2,183 2,589