Mission Possible: Hunting Down and Stopping Stealthy Attackers with MVISION XDR | McAfee Blogs

Mission Possible: Hunting Down and Stopping Stealthy Attackers with MVISION XDR | McAfee Blogs

Imagine, if you will, a scene straight out of one of your favorite impossible mission movies. The background music is driving a suspenseful beat while the antagonist attempts to steal the latest technology from a very favored industry competitor called Rad-X Incorporated. It’s a trade secret that will change the industry forever, and if the villain achieves her mission, she will hold the future of aviation in the palm of her hand. She’s bypassed laser…

Read More

Healthcare’s next emergency: Ransomware follows in the footsteps of the pandemic

Healthcare’s next emergency: Ransomware follows in the footsteps of the pandemic

Healthcare’s next emergency: Ransomware follows in the footsteps of the pandemic | 2021-05-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Five recent political violence lessons from the global insurance industry

Five recent political violence lessons from the global insurance industry

Five recent political violence lessons from the global insurance industry | 2021-05-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Cybersecurity Training: Raising Awareness And Securing Your Business

Cybersecurity Training: Raising Awareness And Securing Your Business

Organizations are increasingly faced with threats from sophisticated criminal organizations and nation-state actors.  To mitigate the risks posed by cyber criminals, organizations must secure and protect their proprietary and sensitive information. They must also commit to training their employees to do their part to protect proprietary and sensitive information. Cybersecurity awareness and training programs educate employees about cybersecurity threats, risks and best practices as well as how to navigate the ever-changing and evolving threat landscape. The importance…

Read More

Ghosts in the Machine – Looking at OT & IT Convergence

Ghosts in the Machine – Looking at OT & IT Convergence

There is a saying in cybersecurity that “Data is the new oil.” If that is true, then that oil is powering not only the economy but also industry. The term ‘Industry 4.0’ refers to the fourth industrial revolution where traditional manufacturing and industrial processes are increasingly using IT and data to the point that we’re now seeing the emergence of ‘smart factories.’ From the management and control of power and water to the management and…

Read More

#RSAC: Bruce Schneier Warns of the Coming AI Hackers

#RSAC: Bruce Schneier Warns of the Coming AI Hackers

Artificial intelligence, commonly referred to as AI, represents both a risk and a benefit to the security of society, according to Bruce Schneier, security technologist, researcher, and lecturer at Harvard Kennedy School. Schneier made his remarks about the risks of AI in an afternoon keynote session at the 2021 RSA Conference on May 17. Hacking for Schneier isn’t an action that is evil by definition; rather, it’s about subverting a system or a set of rules in a way that is unanticipated…

Read More

Continuous and Automated Validation for Tanzu Solutions on VMware Marketplace – Why, What & How – VMware Cloud Community

Continuous and Automated Validation for Tanzu Solutions on VMware Marketplace – Why, What & How – VMware Cloud Community

Why is Continuous Validation important? VMware Marketplace is a one stop-shop for VMware customers to discover, try and deploy various third-party and open-source solutions onto their VMware environments. All deployable assets on VMware Marketplace are pre-tested on their respective VMware environments. This empowers users to deploy these software offerings with confidence, knowing they have access to proven, validated solutions. However, with increased industry focus on ‘earlier, more often’ software release cycles, these marketplace assets run…

Read More

How penetration testing can promote a false sense of security

How penetration testing can promote a false sense of security

Penetration testing in and of itself is a good way to test cybersecurity, but only if every nook and cranny of the digital environment is tested; if not, there is no need to test. Image: Teera Konakan/Moment/Getty Images Rob Gurzeev, CEO and co-founder of CyCognito, a company specializing in attack-surface management and protection, is concerned about blind spots—past and present. In his DarkReading article Defending the Castle: How World History Can Teach Cybersecurity a Lesson,…

Read More

Scammers Impersonating Windows Defender to Push Malicious Windows Apps | McAfee Blogs

Scammers Impersonating Windows Defender to Push Malicious Windows Apps | McAfee Blogs

Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender Update Victims end up allowing the installation of a malicious Windows Application that targets user and system information Browser push notifications can highly resemble Windows system notifications.  As recently discussed, scammers are abusing push notifications to trick users into taking action.  This recent example demonstrates the social engineering tactics used to trick users into installing…

Read More

POPIA – July 1st Deadline Approaches For New South African Data Protection Act | McAfee Blogs

POPIA – July 1st Deadline Approaches For New South African Data Protection Act | McAfee Blogs

Data protection acts are regularly coming into force around the world and on July 1st 2021 it is the turn of South Africa, as the POPIA (Protection of Personal Information Act) will be enforced from that date.  I caught up with David Luyt, Privacy Counsel at Michalsons in Cape Town to discuss what this means for South African consumers, businesses and IT teams. Nigel: Must my organisation comply with POPIA? David: Essentially, if you are domiciled in…

Read More
1 2,345 2,346 2,347 2,348 2,349 2,651