Homeland Security unveils new cybersecurity requirements for pipeline operators

Homeland Security unveils new cybersecurity requirements for pipeline operators

Owners and operators will have to identify any gaps in their security and report new incidents to key federal agencies because of the Colonial Pipeline ransomware attack. Image: Bloomberg/Getty Images In the wake of the ransomware attack against Colonial Pipeline, the Department of Homeland Security (DHS) has revealed new requirements aimed at all pipeline owners and operators in the U.S. Announced by DHS’ Transportation Security Administration (TSA) on Thursday, the security directives are designed to…

Read More

Scripps Health still grappling with impact of May 1 ransomware attack

Scripps Health still grappling with impact of May 1 ransomware attack

The hospital chain has been forced to reschedule operations and is working to bring its electronic health record systems back online. Getty Images/iStockphoto A May 1 ransomware attack against California hospital chain Scripps Health continues to impact both the organization and its patients almost a month later. On Monday, Scripps Health published an FAQ with new details about the attack as well as directions for affected patients. In its update, the organization acknowledged a cybersecurity…

Read More

Data Breach at Canada Post

Data Breach at Canada Post

Canada’s primary postal operator, Canada Post, confirmed Wednesday that it has suffered a data breach.  The security incident occurred following a cyber-attack on one of the Crown corporation’s suppliers, Commport Communications, which provides electronic data interchange solutions.  Commport Communications was hired by the postal service to manage the shipping manifest data of its large parcel business’ customers. Following the cyber-attack, Canada Post has informed 44 of its commercial customers that data belonging to more than 950,000 customers…

Read More

Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail

Why A ‘Layers And Lists’ Approach To Cybersecurity Is Doomed To Fail

By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find one overlooked weakness. Defenders, meanwhile, are often overwhelmed with alerts, unsure what to patch first and have little real visibility into the weaknesses of their ever-changing environments. In a battle between active adversaries who only need to land a single blow to win — and passive defenders…

Read More

Announcing the New Open Source Project Yor, Dynamic and Automated Cloud Infrastructure Tagging

Announcing the New Open Source Project Yor, Dynamic and Automated Cloud Infrastructure Tagging

SANTA CLARA, Calif., May 27, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced the release of Yor, an open-source tool that automatically tags cloud resources within infrastructure as code (IaC) frameworks Terraform, AWS CloudFormation, and Serverless Framework YAML. Yor automates the tedious work of manually tagging cloud resources, helps security teams trace security misconfigurations from code to cloud, and enables highly effective GitOps across all major cloud providers. “Effective…

Read More

Happy Birthday GDPR! | McAfee Blogs

Happy Birthday GDPR! | McAfee Blogs

Believe it or not, the baby turns 3 today! And like with every three-year-old, there is a lot to watch out for. Granted, when GDPR was born it was after a 2-year gestation (transition) period. What followed were many sleepless nights with the new baby when it was born on May 25, 2018; not to mention the sleepless nights in the run up to the birth. Some parents (organisations) were running around frantically trying to…

Read More

Belgium Interior Ministry said it was hit by a sophisticated cyber attack

Belgium Interior Ministry said it was hit by a sophisticated cyber attack

The Belgian interior ministry was targeted by a “sophisticated” cyber attack, a spokesman told RTBF public television on Tuesday.  The Belgian interior ministry was hit by a “sophisticated” cyber-espionage attack, the news was confirmed by a spokesman to RTBF public television on Tuesday. The Federal Public Service Interior’s communications director, Olivier Maerens, confirmed that the attackers were not able to breach the server of the ministry, this means that threat actors did not steal any…

Read More

How to achieve persistent SSH connections with the open source MOSH

How to achieve persistent SSH connections with the open source MOSH

MOSH makes it possible for SSH connection to persist, even as you roam from one network to another. Jack Wallen shows you how to install and use this handy tool. Image: Funtap/Shutterstock If you work with multiple wireless (or wired) connections within your company, and you find yourself having to move around the campus to take care of your admin duties, there might be times when you have an SSH connection going and you shift…

Read More

Today Is The Day! – Docker Blog

Today Is The Day! – Docker Blog

It’s here! Ready or not, DockerCon — our free, one-day, all-digital event designed for developers by developers — has arrived. Registration is open until 9 a.m., so if you haven’t already done so, go ahead and sign up! This is your chance to learn all you can about modern application delivery in a cloud-native world — including the application development technology, skills, tools and people you need to help solve the problems you face day…

Read More

Cryptocurrency scam attack reminds users to check their app connections

Cryptocurrency scam attack reminds users to check their app connections

Are you doing enough to prevent scammers from hijacking your social media accounts? Even if you have chosen a strong, unique password for your online presence and enabled two-factor authentication it’s possible that you’ve overlooked another way in which online criminals could commandeer your social media accounts and spam out a message to your followers. That’s a lesson that internet entrepreneur Carl Pei, the co-founder of smartphone firm OnePlus, has hopefully learned after cryptocurrency scammers…

Read More
1 2,255 2,256 2,257 2,258 2,259 2,581