New Cybersecurity Programs to Protect US Energy

New Cybersecurity Programs to Protect US Energy

The United States is launching three new research programs to protect the security of America’s energy system.  The Department of Energy’s (DOE) Office of Cybersecurity, Energy Security, and Emergency Response (CESER), which announced the new programs, said that they will help “to safeguard the US energy system from growing cyber and physical hazards.” Potential vulnerabilities in the global supply chain will be addressed by the new schemes, which will also explore ways to shield critical infrastructure from…

Read More

Cloudflare introduces SD-WAN- and firewall-as-a-service offerings

Cloudflare introduces SD-WAN- and firewall-as-a-service offerings

In a bid to replace MPLS circuits and SD-WAN appliances, Cloudflare has introduced Magic WAN and Magic Firewall and partnerships with VMware, Aruba, Digital Realty, CoreSite and EdgeConneX. Image: Cloudflare Cloudflare Monday introduced Magic WAN with Magic Firewall as well as new strategic partnerships with network hardware and data center providers as part of Cloudflare One, its cloud-based network-as-a-service offering released in October 2020.  Magic WAN (wide area networking) connects any source of data traffic—data…

Read More

UK Govt Department Loses 306 Mobiles and Laptops in Two Years

UK Govt Department Loses 306 Mobiles and Laptops in Two Years

A UK government department has lost a total of 306 mobile and laptop devices since 2019, according to official figures. The data, obtained under a Freedom of Information (FoI) request by Parliament Street Think Tank, revealed that the Department for Business, Energy and Industrial Strategy had 234 mobiles and 72 laptops lost or stolen during the calendar years of 2019 and 2020. In 2019, 26 laptops were reported stolen and 17 lost. This fell to…

Read More

5 minutes with Jonathan Ehret – The need for third-party risk management in cybersecurity

5 minutes with Jonathan Ehret – The need for third-party risk management in cybersecurity

5 minutes with Jonathan Ehret – The need for third-party risk management in cybersecurity | 2021-03-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Firms Urged to Patch as Attackers Exploit Critical F5 Bugs

Firms Urged to Patch as Attackers Exploit Critical F5 Bugs

Security experts are urging F5 customers to patch a critical vulnerability in the vendor’s BIG-IP and BIG-IQ networking products after warning of mass exploitation attempts in the wild. CVE-2021-22986 is a flaw in the products’ REST-based iControl management interface which could allow for authentication bypass and remote code execution. With a CVSS rating of 9.8, it was patched on March 10 along with several other bugs that could be chained in attacks. These are: CVE-2021-22987,…

Read More

Partners Accelerate Profitability with New Customer Lifecycle Incentives from VMware

Partners Accelerate Profitability with New Customer Lifecycle Incentives from VMware

News Detail PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW) today launched the Customer Lifecycle Incentives Program to help partners facilitate the end-to-end digital transformation for their customers. The program will help partners drive increased profitability through new and expanded customer engagement, a simplified experience, optimized incentive return on investment, and … Mon, 22 Mar 2021 00:00:00 PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW) today launched the Customer Lifecycle Incentives Program to help partners…

Read More

FBI: State and Local Governments Losing Millions to BEC

FBI: State and Local Governments Losing Millions to BEC

The FBI has warned state and local government organizations to be on the lookout for business email compromise (BEC) scams after revealing that millions have already been lost during the past two years. Losses from BEC campaigns ranged from $10,000 to $4m between November 2018 and September 2020, according to a new Private Industry Notification. Attackers are targeting state, local, tribal and territorial (SLTT) government entities, masquerading as vendors and suppliers. They use phishing attacks to…

Read More

Devising Defenses to One of Your Top Security Threats: Business Associate Impostor Emails  | healthsystemcio.com

Devising Defenses to One of Your Top Security Threats: Business Associate Impostor Emails  | healthsystemcio.com

Health system employees often deal with dozens of suppliers to get their jobs done. Supply chain staff — because of their engagement with business associates — regularly download files, click links or use third-party applications. Unfortunately, email fraud often starts with the attacker posing as a trusted individual with a legitimate business request, leaving these end users particularly vulnerable and healthcare organizations exposed to theft and emerging cyber risks. In this webinar, we’ll hear from…

Read More

SoloKeys Solo V2 is an easy and quick way to improve your personal cybersecurity

SoloKeys Solo V2 is an easy and quick way to improve your personal cybersecurity

The security key is built on open source hardware and firmware, making it a universal factor authentication device instead of a two-factor authentication device. The Solo V2 is small key that can boost the security of your online accounts. Image: SoloKeys What’s the key to most of your online accounts? Your email address. What’s standing between this key to your online kingdom and the barbarians at the gate?  A password that probably isn’t very strong….

Read More

Musk Denies Tesla Security Claims After Chinese Military Ban

Musk Denies Tesla Security Claims After Chinese Military Ban

Elon Musk has hit out at claims that Tesla vehicles are a security risk, after the Chinese military reportedly banned them from its facilities. The tech billionaire and founder of the electric car company told attendees at a Beijing conference held by the government that it would be game over for his firm if such allegations were true. “There’s a very strong incentive for us to be very confidential with any information,” Musk said during a…

Read More
1 2,345 2,346 2,347 2,348 2,349 2,558