Healthcare’s next emergency: Ransomware follows in the footsteps of the pandemic

Healthcare’s next emergency: Ransomware follows in the footsteps of the pandemic

Healthcare’s next emergency: Ransomware follows in the footsteps of the pandemic | 2021-05-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Five recent political violence lessons from the global insurance industry

Five recent political violence lessons from the global insurance industry

Five recent political violence lessons from the global insurance industry | 2021-05-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Cybersecurity Training: Raising Awareness And Securing Your Business

Cybersecurity Training: Raising Awareness And Securing Your Business

Organizations are increasingly faced with threats from sophisticated criminal organizations and nation-state actors.  To mitigate the risks posed by cyber criminals, organizations must secure and protect their proprietary and sensitive information. They must also commit to training their employees to do their part to protect proprietary and sensitive information. Cybersecurity awareness and training programs educate employees about cybersecurity threats, risks and best practices as well as how to navigate the ever-changing and evolving threat landscape. The importance…

Read More

Ghosts in the Machine – Looking at OT & IT Convergence

Ghosts in the Machine – Looking at OT & IT Convergence

There is a saying in cybersecurity that “Data is the new oil.” If that is true, then that oil is powering not only the economy but also industry. The term ‘Industry 4.0’ refers to the fourth industrial revolution where traditional manufacturing and industrial processes are increasingly using IT and data to the point that we’re now seeing the emergence of ‘smart factories.’ From the management and control of power and water to the management and…

Read More

#RSAC: Bruce Schneier Warns of the Coming AI Hackers

#RSAC: Bruce Schneier Warns of the Coming AI Hackers

Artificial intelligence, commonly referred to as AI, represents both a risk and a benefit to the security of society, according to Bruce Schneier, security technologist, researcher, and lecturer at Harvard Kennedy School. Schneier made his remarks about the risks of AI in an afternoon keynote session at the 2021 RSA Conference on May 17. Hacking for Schneier isn’t an action that is evil by definition; rather, it’s about subverting a system or a set of rules in a way that is unanticipated…

Read More

Continuous and Automated Validation for Tanzu Solutions on VMware Marketplace – Why, What & How – VMware Cloud Community

Continuous and Automated Validation for Tanzu Solutions on VMware Marketplace – Why, What & How – VMware Cloud Community

Why is Continuous Validation important? VMware Marketplace is a one stop-shop for VMware customers to discover, try and deploy various third-party and open-source solutions onto their VMware environments. All deployable assets on VMware Marketplace are pre-tested on their respective VMware environments. This empowers users to deploy these software offerings with confidence, knowing they have access to proven, validated solutions. However, with increased industry focus on ‘earlier, more often’ software release cycles, these marketplace assets run…

Read More

How penetration testing can promote a false sense of security

How penetration testing can promote a false sense of security

Penetration testing in and of itself is a good way to test cybersecurity, but only if every nook and cranny of the digital environment is tested; if not, there is no need to test. Image: Teera Konakan/Moment/Getty Images Rob Gurzeev, CEO and co-founder of CyCognito, a company specializing in attack-surface management and protection, is concerned about blind spots—past and present. In his DarkReading article Defending the Castle: How World History Can Teach Cybersecurity a Lesson,…

Read More

Scammers Impersonating Windows Defender to Push Malicious Windows Apps | McAfee Blogs

Scammers Impersonating Windows Defender to Push Malicious Windows Apps | McAfee Blogs

Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender Update Victims end up allowing the installation of a malicious Windows Application that targets user and system information Browser push notifications can highly resemble Windows system notifications.  As recently discussed, scammers are abusing push notifications to trick users into taking action.  This recent example demonstrates the social engineering tactics used to trick users into installing…

Read More

POPIA – July 1st Deadline Approaches For New South African Data Protection Act | McAfee Blogs

POPIA – July 1st Deadline Approaches For New South African Data Protection Act | McAfee Blogs

Data protection acts are regularly coming into force around the world and on July 1st 2021 it is the turn of South Africa, as the POPIA (Protection of Personal Information Act) will be enforced from that date.  I caught up with David Luyt, Privacy Counsel at Michalsons in Cape Town to discuss what this means for South African consumers, businesses and IT teams. Nigel: Must my organisation comply with POPIA? David: Essentially, if you are domiciled in…

Read More

Cyber Self-Defense Is Not Complicated

Cyber Self-Defense Is Not Complicated

Anomali Sr. Director of Cyber Intelligence Strategy A.J. Nash recently penned a column for United States Cybersecurity Magazine about how few people in the modern world are immune to the threat of a cyber-attack. Hence, the importance of cyber self-defense. In “Cyber Self-Defense Is Not Complicated,” A.J. talks about why self-commitment is an increasingly effective way to minimize the risks that certainly lurk. Whether it be texts that include personal content not meant for public…

Read More
1 2,348 2,349 2,350 2,351 2,352 2,654