Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety

Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety

Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an entirely new work from home mindset and diverted their weekly commuting hours to other productive and more enjoyable pursuits. As parts of the world return to a “new normal,” another change is on the way: a gradual return to the office.  The hybrid working model is met with mixed reviews from employees and business security teams alike. For some employees, a clearer separation between work…

Read More

Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety | McAfee Blogs 4 Ways to Keep Your Information Safe in a Hybrid Workplace

Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety | McAfee Blogs 4 Ways to Keep Your Information Safe in a Hybrid Workplace

Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an entirely new work from home mindset and diverted their weekly commuting hours to other productive and more enjoyable pursuits. As parts of the world return to a “new normal,” another change is on the way: a gradual return to the office.  The hybrid working model is met with mixed reviews from employees and business security teams alike. For some employees, a clearer separation between work…

Read More

Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety

Hybrid Workplace Vulnerabilities: 4 Ways to Promote Online Safety

Over the past year and a half, workers everywhere have gotten used to working from home. They have adopted an entirely new work from home mindset and diverted their weekly commuting hours to other productive and more enjoyable pursuits. As parts of the world return to a “new normal,” another change is on the way: a gradual return to the office.  The hybrid working model is met with mixed reviews from employees and business security teams alike. For some employees, a clearer separation between work…

Read More

How humans make decisions, and how that affects cloud computing

How humans make decisions, and how that affects cloud computing

As a cloud economist at VMware, I think a lot about the process of how humans make decisions. In previous articles, I have written about how economics evolved, in a larger sense, with the arrival of behavioral economics. There has also been framing devices used in the teaching of economics. For example, from the 70s to the 90s, that framing was around incentives, and how humans can react to incentives. The rise in popularity of…

Read More

Oracle July 2021 Critical Patch Update Addresses 231 CVEs

Oracle July 2021 Critical Patch Update Addresses 231 CVEs

Oracle addresses 231 CVEs in its third quarterly update of 2021 with 342 patches, including 49 critical updates. Background On July 20, Oracle released its Critical Patch Update (CPU) for July 2021, the third quarterly update of the year. This CPU update contains fixes for 231 CVEs in 342 security updates across 26 Oracle product families. Out of the 342 security updates published this quarter, 13% of patches were assigned a critical severity. Medium severity…

Read More

Cybersecurity risk: The number of employees going around IT security may surprise you

Cybersecurity risk: The number of employees going around IT security may surprise you

The findings detail a complex security balancing act between IT teams and users; especially in the age of remote work and virtual collaboration at scale. Image: GettyImages/Maskot Last month, cybersecurity company Hysolate published a report about the “Enterprise Security Paradox,” highlighting challenges associated with enabling IT freedoms while ensuring tight security procedures. The findings detail a complex balancing act between IT teams and network users. Calibrating this equilibrium is particularly challenging in the age of…

Read More

Cybersecurity lags behind as IoT devices proliferate, according to a new report

Cybersecurity lags behind as IoT devices proliferate, according to a new report

About one-quarter of respondents do not incorporate any of the listed measures to protect these devices and many feel as though consumers are not responsible for smart and IoT device security. Image: GettyImages/Andrey Suslov The modern smart home is brimming with a vast array of interconnected devices to help humans preheat ovens, set the ambiance around the house and even remotely feed the family pet. However, these internet-enabled devices also present new security risks and…

Read More

Moving OT to the cloud means accounting for a whole new host of security risks

Moving OT to the cloud means accounting for a whole new host of security risks

ICS systems managed via cloud software are open to exploits that could be destructive enough to cause physical damage to industrial systems. Here’s how to protect your operational technology network. chombosan, Getty Images/iStockphoto In the race to move operational technology (OT) and industrial control systems (ICS) to the cloud, critical vulnerabilities in popular cloud management software from CODESYS and programmable logic controllers (PLCs) made by WAGO Corp. have been uncovered.  The report, from Claroty research…

Read More

IT/OT Convergence or IT/OT Integration? | The State of Security

IT/OT Convergence or IT/OT Integration? | The State of Security

IT/OT convergence is an oft-repeated term, and maybe it’s the wrong term. From a technology standpoint, IT/OT convergence has been occurring since at least the 1990s when HMI/Operator Stations began running on Windows and when Ethernet began displacing deterministic custom LAN protocols in the OT realm. This technology convergence has continued with networking, cybersecurity, virtualization, edge, zero trust, etc. The biggest change since the 1990s is that the time lag between technology being common in…

Read More

New Bill Could Force U.S. Businesses to Report Data Breaches Quicker

New Bill Could Force U.S. Businesses to Report Data Breaches Quicker

A bipartisan Senate bill would require some businesses to report data breaches to law enforcement within 24 hours or face financial penalties and the loss of government contracts. The legislation from Senate Intelligence Chair and Democratic Senator Mark Warner with Republican Senators Marco Rubio and Susan Collins is just one of several new cybersecurity bills that will likely be debated this year. If passed, the bill could require certain U.S. businesses to do much more…

Read More
1 2,319 2,320 2,321 2,322 2,323 2,730