Making Sure the Lights Don’t Go Out

Making Sure the Lights Don’t Go Out

By Brett Raybould, EMEA Solutions Architect at Menlo Security The ransomware attack on Colonial Pipeline, the largest fuel pipeline in the US has shown just how vulnerable the energy industry is to cyber-attacks. Brett Raybould, EMEA Solutions Architect at Menlo Security, looks at what it takes to keep the lights on. In threat reports, the energy and utilities sector often tops the list of industries in terms of the number of attacks and cost of…

Read More

Multi-Cloud Use Maturity – Tools and Platform Standardization – Cloud Blog – VMware

Multi-Cloud Use Maturity – Tools and Platform Standardization – Cloud Blog – VMware

This blog on Cloud Tools and Platform Standardization represents part 7 of a multi-part blog series on multi-cloud use maturity.  A comprehensive eBook that includes the entire multi-cloud use maturity framework can be found here.  At the end of this blog, you can also find links to all the prior blogs in this series. In a multi-cloud world – complexity is the enemy Until recently, most teams that were responsible for app dev and IT operations…

Read More

72% of Organizations Experienced a DNS Attack in the Last Year

72% of Organizations Experienced a DNS Attack in the Last Year

Nearly three-quarters (72%) of organizations have suffered a domain name system (DNS) attack in the last 12 months, according to a new study by the Neustar International Security Council (NISC). Of those organizations affected, 61% were targeted on multiple occasions, while 11% have been victimized regularly. While Neustar noted that DNS attacks are generally a lower concern for security pros than vectors like ransomware, distributed denial-of-service (DDoS) and targeted account hacking, they are becoming increasingly menacing to…

Read More

US Gov warns of BlackMatter attacks against critical infrastructure

US Gov warns of BlackMatter attacks against critical infrastructure

The US Government has issued an alert to organisations about the threat posed by the BlackMatter ransomware group. The government’s Cybersecurity & Infrastructure Security Agency (better known as CISA) issued the advisory earlier this week, following a series of BlackMatter ransomware attacks since July 2021 targeting US critical infrastructure, including two American organisations working in the food and agriculture sector. The BlackMatter ransomware, which came to prominence earlier this year following the demise of the…

Read More

#ISC2Congress: How to Mitigate Evolving Insider Threats

#ISC2Congress: How to Mitigate Evolving Insider Threats

The changing nature of insider threats was described by Lisa Forte, founder, Red Goat Cyber Security, during a keynote presentation at this week’s virtual ISC2 Security Congress 2021. Forte began by noting that traditionally, insider threat actors are seen as ‘bad apples’ within a business, but we have now “moved quite far away from that.” Indeed, many perpetrators do so without malicious intent. She also pointed out that it has become far easier for employees to carry out…

Read More

How to digitally sign email in Apple Mail

How to digitally sign email in Apple Mail

Adding a digital signature to your email is just one simple step you can take in your journey for more secure communications. Jack Wallen shows you how this is done in the latest version of Apple Mail. Image: GettyImages/Westend61 Digitally signing an email might not be a singular means to a secure end, but it can at least help recipients of your email better trust the missives you send them. Although this isn’t something you…

Read More

Congress passes DHS software supply chain bill

Congress passes DHS software supply chain bill

Congress passes DHS software supply chain bill This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Realize Your SASE Vision with Security Service Edge and McAfee Enterprise

Realize Your SASE Vision with Security Service Edge and McAfee Enterprise

Many people are excited about Gartner’s Secure Access Service Edge (SASE) framework and the cloud-native convergence of networks and security. While originally proposed as fully unified architecture delivering network and security capabilities, the reality soon dawned that enterprise transition to a complete SASE model would be a decade long journey due to factors such as existing investments, operational silos (customer), and vendor consolidation. Consequently, Gartner introduced a new two-vendor approach to SASE that brought together…

Read More

Log Insight – AIOps with vRealize (Part 2) – Cloud Blog – VMware

Log Insight – AIOps with vRealize (Part 2) – Cloud Blog – VMware

The Challenge with Logs If you consider your time working with technology, reviewing log files must be one of the most daunting tasks. It certainly is for me, line after line of output messages, that may or may not be readable to a human being, searching for the few words, which hopefully bring clarity to a deployment failure, or a production outage.   For troubleshooting success, you must rely on a few characteristics of those logs to be present:  Consistent timestamps  Log Level identification …

Read More

How to Report Identity Theft to Social Security

How to Report Identity Theft to Social Security

In the hands of a thief, your Social Security Number is the master key to your identity.  With a Social Security Number (SSN), a thief can unlock everything from credit history and credit line to tax refunds and medical care. In extreme cases, thieves can use it to impersonate others. So, if you suspect your number is lost or stolen, it’s important to report identity theft to Social Security right away.  Part of what makes an SSN so powerful in identity theft is that there’s only one like it. Unlike a compromised credit card, you can’t…

Read More
1 2,194 2,195 2,196 2,197 2,198 2,758