How artificial intelligence can transform event venue security operations

How artificial intelligence can transform event venue security operations

How artificial intelligence can transform event venue security operations | 2021-06-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Improving insider threat awareness

Improving insider threat awareness

Improving insider threat awareness | 2021-06-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Finding Trusted Suppliers and Sourcing Products Efficiently: New Innovations for Security Leaders

Finding Trusted Suppliers and Sourcing Products Efficiently: New Innovations for Security Leaders

Finding Trusted Suppliers and Sourcing Products Efficiently: New Innovations for Security Leaders | 2019-06-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Why We Care About Cybersecurity Hygiene

Why We Care About Cybersecurity Hygiene

By James Opiyo, Senior Consultant Security Strategy, Kinetic By Windstream Maintaining good cybersecurity hygiene habits is just as important as maintaining good personal hygiene habits. We must maintain high cybersecurity standards to protect our digital health from some common cyber threats. Common threats to our digital health Malicious software (malwares) designed to steal information and or cause damage to our connected devices. Viruses that infect connected devices and then spread to others while giving cybercriminals…

Read More

UNC2465 cybercrime group launched a supply chain attack on CCTV vendor

UNC2465 cybercrime group launched a supply chain attack on CCTV vendor

UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of a CCTV camera vendor. An affiliate of the Darkside ransomware gang, tracked as UNC2465, has conducted a supply chain attack against a CCTV vendor, Mandiant researchers discovered. UNC2465 is considered one of the main affiliated of the DARKSIDE group, along with other affiliates gangs tracked by FireEye/Mandiant as UNC2628 and UNC2659. The crooks compromised the website of the…

Read More

Texan Admits Data Center Bomb Plot

Texan Admits Data Center Bomb Plot

A man from Texas could be facing up to 20 years in prison after pleading guilty to plotting to blow up a data center in Virginia. Seth Aaron Pendley, of Wichita Falls, was arrested in April after trying to purchase what he believed to be an explosive device from an undercover FBI employee in Fort Worth. The 28-year-old admitted that he had planned to use the device to destroy servers in an Amazon-owned data center located on…

Read More

New Jersey Councilor Charged with Cyber-harassment

New Jersey Councilor Charged with Cyber-harassment

A councilor from New Jersey has been arrested and charged with waging a campaign of cyber-harassment against a former girlfriend.  Detectives from the Cape May County Prosecutor’s Office, with the assistance of detectives from the Middle Township Police Department, launched an investigation into the activities of 43-year-old realtor and Cape May councilman Christopher Bezaire in May 2021 after allegations of cyber-abuse were made.  Bezaire, who is the president of the Cape May County Board of Realtors, was…

Read More

Colorado Passes New Privacy Act

Colorado Passes New Privacy Act

The Centennial State has unanimously passed a new data privacy act to safeguard Coloradoans’ personal information. On June 8, the state Senate approved the Colorado Privacy Act after a series of revisions were made. The Act is due to take effect on July 1, 2023, and now awaits the signature of state governor Jared Polis.  Should the Act become law, Colorado will follow California and Virginia by enacting comprehensive privacy legislation. The Act gives consumers who reside in Colorado five…

Read More

Stopping threats in today’s threat landscape

Stopping threats in today’s threat landscape

Stopping threats in today’s threat landscape | 2021-06-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

5 minutes with Inon Shkedy – API security risks

5 minutes with Inon Shkedy – API security risks

5 minutes with Inon Shkedy – API security risks | 2021-06-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More
1 2,282 2,283 2,284 2,285 2,286 2,645