Schools Forced to Shut Following Ransomware Attack

Schools Forced to Shut Following Ransomware Attack

Two schools in the south of England have been forced to temporarily close their doors after a ransomware attack that encrypted and stole sensitive data. The Skinners’ Kent Academy and Skinners’ Kent Primary School were attacked on June 2, according to a statement on the trust’s website which said it is currently working with third-party security experts, the police and the National Cyber Security Centre (NCSC). It revealed that on-premise servers were targeted at the Tunbridge Well-based schools….

Read More

High Street Banks Exposing Customers to Phishing Attacks

High Street Banks Exposing Customers to Phishing Attacks

A consumer rights group is calling on all high street banks to improve their anti-phishing capabilities after spotting that a key protocol is sometimes not configured to offer maximum protection.   Domain-based message authentication, reporting and conformance (DMARC) is a tried-and-tested way to help brands block phishing emails to customers. It helps to verify that the domain of the sender hasn’t been impersonated, although it must be set to “p=reject” in order to prevent suspicious emails…

Read More

JBS Admits Paying REvil Ransomware Group $11 Million

JBS Admits Paying REvil Ransomware Group  Million

A meat processing giant recently hit by ransomware has confirmed it paid its extorters $11 million, reigniting the debate over the ethics of doing so. A statement published by Sao Paolo-headquartered JBS, whose US and Australia businesses were hit in the incident last week, claimed that at the time of payment, the “vast majority” of its facilities were operational. “In consultation with internal IT professionals and third-party cybersecurity experts, the company made the decision to…

Read More

Key Considerations for the DoE on Defending the Bulk Power Grid

Key Considerations for the DoE on Defending the Bulk Power Grid

On January 20, President Joseph Biden issued Executive Order (E.O.) 13990 to help protect U.S. bulk power organizations. This Order enacted a 90-day suspension of E.O. 13920 which was set by the previous administration. The new executive order empowered the Secretary of Energy (“Secretary”) to publish new criteria around pre-qualifying vendors of electric equipment, as well as to devise rules for helping U.S. entities replace electric devices at risk of sabotage. With those functions suspended,…

Read More

Tenable.io Named Best Vulnerability Management Solution at SC Awards Europe 2021

Tenable.io Named Best Vulnerability Management Solution at SC Awards Europe 2021

Tenable®, Inc., the Cyber Exposure company, announced Tenable.io® was named the winner of the SC Awards Europe Best Vulnerability Management Solution category. The enterprise is rapidly evolving as organisations embrace digital transformation. Against this expanded attack surface, organisations struggle with vulnerability overload and the inability to identify today’s most business-critical issues before they become tomorrow’s compromises. Tenable.io was designed to address this challenge. Powered by Nessus technology and managed in the cloud, it automatically detects…

Read More

Proofpoint Announces Expiration of “Go-Shop” Period | Proofpoint US

Proofpoint Announces Expiration of “Go-Shop” Period | Proofpoint US

Transaction Is Expected to Close in Third Quarter of 2021 Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced the expiration of the 45-day “go-shop” period under the terms of the previously announced definitive agreement, pursuant to which Thoma Bravo, a leading private equity investment firm focused on the software and technology-enabled services sector, will acquire Proofpoint in an all-cash transaction that values Proofpoint at approximately $12.3 billion. The “go-shop” period expired…

Read More

The buyer’s dilemma: Insights and tips on finding the right cybersecurity vendor

The buyer’s dilemma: Insights and tips on finding the right cybersecurity vendor

The buyer’s dilemma: Insights and tips on finding the right cybersecurity vendor | 2021-06-10 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Zero Trust, a core component of any modern security strategy

Zero Trust, a core component of any modern security strategy

Zero Trust, a core component of any modern security strategy | 2021-06-10 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Tenable Partners with CyberNB to Secure Canada’s Critical Infrastructure

Tenable Partners with CyberNB to Secure Canada’s Critical Infrastructure

Tenable®, Inc., the Cyber Exposure company, today announced it has become the first vulnerability management vendor to partner with CyberNB’s Critical Infrastructure Security Operations Center (CI-SOC) to increase the resilience and security of Canada’s critical infrastructure. Through the strategic partnership, Tenable will bring its risk-based vulnerability management and industrial security solutions to the CI-SOC, empowering critical infrastructure stakeholders to see, predict and reduce cybersecurity risk.  CI-SOC brings together data from multiple critical infrastructure owners and…

Read More

Rethinking Remote Monitoring and Management: How MSPs Can Put Security First and Better Protect Their Clients

Rethinking Remote Monitoring and Management: How MSPs Can Put Security First and Better Protect Their Clients

By Ryan Heidorn, Managing Partner, Steel Root For most Managed Service Providers (MSPs), using a remote monitoring and management (RMM) platform to centrally manage their clients’ networks is a foregone conclusion – it’s generally assumed that RMM tools are necessary to deliver IT services. However, that tide may be turning as more MSPs wake up to the fact that traditional RMM platforms can introduce an increasingly unacceptable level of risk to their business and their…

Read More
1 2,233 2,234 2,235 2,236 2,237 2,581