Biden Administration Cancels $10bn JEDI Contract

Biden Administration Cancels bn JEDI Contract

The Biden administration has announced the cancellation of a $10bn massive cloud-computing contract awarded to Microsoft.  After Microsoft won a lengthy bidding process for the Joint Enterprise Defense Infrastructure (JEDI) cloud contract in 2019, competing contractor Amazon Web Services (AWS) complained that the decision wasn’t fair. Yesterday the DoD issued a statement declaring that the contract had passed its sell-by date and was no longer relevant. “The Department has determined that, due to evolving requirements, increased cloud conversancy, and industry advances,…

Read More

$13.7 million: Atlas VPN adds up the impact of the top 10 most successful blockchain scams

.7 million: Atlas VPN adds up the impact of the top 10 most successful blockchain scams

A new report finds that fake investment scams have netted the most funds among all the types of active blockchain scams. Image: Wit Olszewski/Shutterstock If you have been swindled by a blockchain con, the most likely culprit is a fake investment scam, according to an analysis by Atlas VPN. The top 10 most successful currently active blockchain scams have collected $13.7 million so far, the report found. CryptoMixer.com, a fake Bitcoin tumbler, is the biggest…

Read More

What to do when 2FA won’t allow you into your Linux servers

What to do when 2FA won’t allow you into your Linux servers

If two-factor authentication logins on your Linux servers are giving you fits, Jack Wallen has the solution for you. Image: iStockphoto/Jirsak Recently, I had an incident where a two-factor authentication-enabled Linux server wouldn’t allow me in via SSH. Fortunately, I had physical access to the server, so it wasn’t a complete disaster. Had I not been able to log into the machine on site, I would have had to count on someone on-premise to take…

Read More

Most Insider Data Breaches Aren’t Malicious

Most Insider Data Breaches Aren’t Malicious

The majority of insider data breaches are non-malicious, according to new research released today by American cybersecurity software company Code42 in partnership with Aberdeen Research.  The report Understanding Your Insider Risk and the Value of Your Intellectual Property found that at least one in three (33%) reported data breaches involve someone with authorized access to the impacted data. A key finding of the report was that 78% of those insider data breaches involved unintentional data exposure or loss rather than any malice. Researchers…

Read More

Is cyber insurance costing you 30% more?

Is cyber insurance costing you 30% more?

Is cyber insurance costing you 30% more? | 2021-07-07 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Kaseya attack shows how third-party software is the perfect delivery method for ransomware

Kaseya attack shows how third-party software is the perfect delivery method for ransomware

An analysis by Sophos suggests that the latest attack is similar to one that Kaseya endured in 2018. Kaseya issued its annual IT operations report only three days before getting hit by a ransomware attack. The report’s first finding was incredibly and unfortunately accurate: Improving IT security remains top priority amid a rise in cyberattacks. According to an analysis by Sophos, the bad actors behind this attack “not only found a new vulnerability in Kaseya’s…

Read More

Join VMware and AWS for a Cloud Camp Virtual Roadshow on July 22nd – VMware Cloud Community

Join VMware and AWS for a Cloud Camp Virtual Roadshow on July 22nd – VMware Cloud Community

Cloud is a top priority for IT organizations of all sizes looking to leverage scalable and elastic infrastructure services to develop new applications fast and deliver their most critical business applications. Over 76% of organizations employ a hybrid cloud strategy to gain flexibility in their application deployments, disaster recovery, and scalability needs. VMware Cloud on AWS is a jointly engineered solution by VMware and AWS to provide a VMware Cloud Foundation (based on vSphere) as…

Read More

How to stop accruing technical debt and reduce cybersecurity risks

How to stop accruing technical debt and reduce cybersecurity risks

Learn the three areas of technical-debt accumulation that business and IT leaders need to monitor in order to reduce cybersecurity or business continuity incidents. Image: monstArrr_, Getty Images/iStockphoto Getting products to market before they are ready can result in lawsuits, product recalls and cybercrime. If your family car is recalled, it’s inconvenient, but cybersecurity events such as the Colonial Pipeline ransomware attack and the Fastly global outage become much more than an inconvenience. As to…

Read More

The Ultimate Guide to Safe Sharing Online

The Ultimate Guide to Safe Sharing Online

We live in a world that thrives on digital connectivity. According to We Are Social, Canadians are now spending half a day more a month online than they did a year ago. Also, 33 million Canadians logged on to the internet at least once a month in 2020. As more people every year are spending hours upon hours online, they are knowingly (and sometimes unknowingly) unsafely releasing their personal information into the digital ether, making them vulnerable to all sorts of…

Read More
1 2,194 2,195 2,196 2,197 2,198 2,587