Global Police Seize Close Record Number of Fake Pharma Sites

Global Police Seize Close Record Number of Fake Pharma Sites

A global policing operation has led to the closure of over 110,000 websites and online marketplaces selling fake pharmaceuticals, according to the international organization Interpol. The organization said that Operation Pangea XIV involved law enforcement, customs and regulatory officers from 92 countries. As well as the removal of 113,020 fake sites — the largest number since the long-running operation began in 2008 — counterfeit medicines and COVID-19 testing kits were seized after raids and checks on…

Read More

Protecting the New Most Vulnerable Population – The Grandparent Scam

Protecting the New Most Vulnerable Population – The Grandparent Scam

In Part 1 of this series, we introduced the concept that the most vulnerable people on the internet are our senior population. According to the FBI, elder fraud impacts millions of American seniors every year. Figures from the United Kingdom show similar levels of criminal activity targeting seniors. Most of the elder fraud schemes are financially driven, targeting those who most likely have a secure and readily available source of income such as retirement accounts, pensions, and…

Read More

A Look at a Zero Trust Strategy for the Remote Workforce

A Look at a Zero Trust Strategy for the Remote Workforce

If you are new to the security world, it is fair to ask yourself, “Isn’t access to data and systems always conditional? Isn’t it always granted to someone who has access to the credentials (ID and password)?” True enough, but in totality, the approach to managing access encompasses a broader spectrum of privacy policies. These policies include a mix of different strategies that can be applied based on an organization’s security vulnerabilities. Conditional access is…

Read More

How COVID-19 has made us rethink our IT teams | IT Governance

How COVID-19 has made us rethink our IT teams | IT Governance

As organisations start to consider life after COVID-19, they’ll realise that it’s not as simple as putting everything back the way it was in the Before Times. That ship has sailed. There have simply been too many benefits to remote working for organisations to demand a return to office life on a full-time basis. Indeed, a Gartner survey found that 47% of organisations will give employees the choice of working remotely full-time once the pandemic…

Read More

Enterprise security: Positioning your team as a value add, not a cost center

Enterprise security: Positioning your team as a value add, not a cost center

Enterprise security: Positioning your team as a value add, not a cost center | 2021-06-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Real-time locating systems as a security tool

Real-time locating systems as a security tool

Real-time locating systems as a security tool | 2021-06-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

A loaded word: The challenge of defining active assailant protocols in PreK-12 schools

A loaded word: The challenge of defining active assailant protocols in PreK-12 schools

A loaded word: The challenge of defining active assailant protocols in PreK-12 schools | 2021-06-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Proofpoint Announces Cancellation of its 2021 Annual Meeting of Stockholders | Proofpoint US

Proofpoint Announces Cancellation of its 2021 Annual Meeting of Stockholders | Proofpoint US

Special Meeting of Stockholders to Vote on Pending Acquisition by Thoma Bravo to be Scheduled for Later Date Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced its Board of Directors has cancelled the 2021 Annual Meeting of Stockholders scheduled for June 15, 2021. This follows the previously announced definitive agreement, pursuant to which Thoma Bravo, a leading private equity investment firm focused on the software and technology-enabled services sector, will acquire…

Read More

Uncovering hidden cybersecurity risks

Uncovering hidden cybersecurity risks

By Adam Nichols, Principal of Software Security at GRIMM The technology we use and depend upon has critical vulnerabilities in their software and firmware, lurking just beneath the surface of the code. Yet, our process has not changed.  A week does not go by where we are not reading about a serious vulnerability in the news and subsequently scrambling to see if we are affected. This scramble, this mad dash, is a process we have…

Read More

Why Ensuring Cyber Resilience Has Never Been More Critical or More Challenging Than It Is Today

Why Ensuring Cyber Resilience Has Never Been More Critical or More Challenging Than It Is Today

By Don Boxley, Co-founder and CEO, DH2i When it comes to optimizing Microsoft SQL Server high availability (HA) and disaster recovery (DR), there’s a strong correlation between greater database transaction processing performance, business resiliency, and profitability—particularly for workloads like those in industries like financial services, though certainly other sectors as well. The fact is that our world is connected yet fragile, which creates many challenges when it comes to database HA/DR—specifically with resilience, security, and…

Read More
1 2,229 2,230 2,231 2,232 2,233 2,582