Palo Alto Networks Appoints Aparna Bawa to Its Board of Directors

Palo Alto Networks Appoints Aparna Bawa to Its Board of Directors

SANTA CLARA, Calif., May 14, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced the appointment of Aparna Bawa to the company’s board of directors. “Aparna is a proven leader who has helped technology companies rapidly scale, and I’m pleased to welcome her to our board,” said Nikesh Arora, chairman and CEO of Palo Alto Networks. “She embodies our commitment to an experienced, creative and diverse leadership team. Along with other…

Read More

Expert: Intel sharing is key to preventing more infrastructure cyberattacks

Expert: Intel sharing is key to preventing more infrastructure cyberattacks

Old technology and fear of sharing proprietary information are keeping companies from helping each other thwart attacks. TechRepublic’s Karen Roby spoke with Neal Dennis, a threat intel specialist at Cyware Labs, about threats to the U.S. power grid. The following is an edited transcript of their conversation. Karen Roby: Intel sharing, this is something that you’ve been immersed in for many years as a former Marine and then made cybersecurity your specialty. Talk a little…

Read More

Lemonade Denies “Unforgivably Negligent” Security Gaffe

Lemonade Denies “Unforgivably Negligent” Security Gaffe

Insurtech company Lemonade has refuted claims put forward by a short seller that it has an “unforgivably negligent security flaw” on its website. Muddy Waters Research LLC alleges that a vulnerability exists on Lemonade’s website that could potentially expose customers’ personally identifiable information.  The investor claims that it was able to log in to and edit Lemonade customer accounts without having to enter any user credentials.  In an open letter to Lemonade CEO Dan Schreiber dated May 13, Muddy Waters…

Read More

US Sentences Cyber-Stalker Who Sent Sex Workers to Family’s Home

US Sentences Cyber-Stalker Who Sent Sex Workers to Family’s Home

A cyber-stalker from Hawaii who tormented a Utah family by sending more than 500 unwanted service people to their home has been placed under three years of supervision. Loren M. Okamura was arrested in December 2019 on charges of cyber-stalking, making interstate threats, and transporting a person over state lines for the purpose of prostitution.  Over a seven-month period that started in August 2018, Okamura sent up to 20 people a day to the North…

Read More

Rapid7 Source Code Accessed in Cyber-attack

Rapid7 Source Code Accessed in Cyber-attack

Source code and credentials belonging to cybersecurity company Rapid7 were accessed by an unauthorized third party during a supply-chain attack on Codecov. Starting on January 31, hackers gained restricted access to hundreds of networks belonging to Codecov’s customers by tampering with one of the San Francisco–based company’s software development tools. Codecov, whose customers include IBM and Hewlett-Packard, announced on April 15 that a malicious party had gained access to its Bash Uploader script and modified it. “The actor gained access…

Read More

Executive impersonation attacks increased substantially between Q1 2020 and Q1 2021

Executive impersonation attacks increased substantially between Q1 2020 and Q1 2021

Executive impersonation attacks increased substantially between Q1 2020 and Q1 2021 | 2021-05-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

New Executive Order Seeks to Strengthen Security of Fed Gov Networks

New Executive Order Seeks to Strengthen Security of Fed Gov Networks

The Biden Administration published a new executive order (EO) to strengthen the digital security of U.S. federal government networks. Published on May 12 by The White House, the executive order covered much of what many media outlets reported would appear in the draft. This included the issue of supply chain security. For example, the EO stated that the U.S. federal government will begin requiring developers to make security data about their tools publicly available. It…

Read More

Don’t Sweat Your Security: How to Safely Incorporate IoT Into Your Fitness Routine | McAfee Blogs

Don’t Sweat Your Security: How to Safely Incorporate IoT Into Your Fitness Routine | McAfee Blogs

Many have seamlessly transitioned their fitness regimens out of the gym and into the living room since the start of the COVID-19 pandemic, thanks in part to the use of IoT devices. IoT (Internet of Things) denotes the web of interconnected physical devices embedded with sensors and software to collect and share information via the internet. The most common IoT devices used for virtual fitness include wearable fitness trackers and stationary machines equipped with digital interfaces. As effective as these devices are for facilitating…

Read More

Don’t Sweat Your Security: How to Safely Incorporate IoT Into Your Fitness Routine

Don’t Sweat Your Security: How to Safely Incorporate IoT Into Your Fitness Routine

Many have seamlessly transitioned their fitness regimens out of the gym and into the living room since the start of the COVID-19 pandemic, thanks in part to the use of IoT devices. IoT (Internet of Things) denotes the web of interconnected physical devices embedded with sensors and software to collect and share information via the internet. The most common IoT devices used for virtual fitness include wearable fitness trackers and stationary machines equipped with digital interfaces. As effective as these devices are for facilitating…

Read More
1 2,276 2,277 2,278 2,279 2,280 2,579