VMware Names Paula Hodgins SVP, Worldwide Accounts and Telco Sales

VMware Names Paula Hodgins SVP, Worldwide Accounts and Telco Sales

News Detail PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW), a leading innovator in enterprise software, today announced Paula Hodgins has joined the leadership team as senior vice president of worldwide accounts and telco sales, based in Toronto. In this role, Hodgins is responsible for global sales and operational management across VMware accounts and telecommunications customers. “VMware … Wed, 17 Mar 2021 00:00:00 PALO ALTO, Calif.–(BUSINESS WIRE)– VMware, Inc. (NYSE: VMW), a leading innovator in…

Read More

Chinese Threat Actors Target Global 5G Operators

Chinese Threat Actors Target Global 5G Operators

Security researchers have discovered a new cyber-espionage campaign targeting global telecoms operators for IP and information relating to 5G. Named Operation Diànxùn by McAfee, the campaign is likely to be the work of Chinese threat actors RedDelta and Mustang Panda. “While the initial vector for the infection is not entirely clear, the McAfee ATR team believes with a medium level of confidence that victims were lured to a domain under control of the threat actor,…

Read More

More Than a Quarter of Threats Never Seen Before

More Than a Quarter of Threats Never Seen Before

Over a quarter (29%) of threats spotted in Q4 2020 had never before been detected in-the-wild, giving attackers an advantage over their victims, according to HP Inc. The tech giant’s latest Quarterly Threat Insights Report was compiled from data gathered from its global customers’ Sure Click virtual machines from October to December 2020. While these isolated micro-VMs effectively segment malware from the endpoint and let it execute harmlessly, the widespread use of packers and obfuscation…

Read More

Security versus Compliance: What’s the Difference?

Security versus Compliance: What’s the Difference?

Security and compliance – a phrase often uttered in the same breath as if they are two sides of the same coin, two members of the same team or two great tastes that go great together. As much as I would like to see auditors, developers, and security analysts living in harmony like a delicious Reese’s cup, a recent gap analysis that I was part of reminded me that too often the peanut butter and…

Read More

3 must-read books on ISO 27001 – IT Governance UK Blog

3 must-read books on ISO 27001 – IT Governance UK Blog

As you start your ISO 27001 implementation project, you probably want to know about much as possible. Some people attend training courses to pick up the knowledge of ISO 27001, and others go one step further, hiring an ISO 27001 consultant to guide them through the process. Those are both excellent options for those with the time and budget, but what if you’re looking for a less expensive approach? In those cases, you can never…

Read More

Healthcare security: a specialized field

Healthcare security: a specialized field

Healthcare security: a specialized field | 2021-03-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Cybersecurity and Geopolitical video podcast – March 2021 episode

Cybersecurity and Geopolitical video podcast – March 2021 episode

Cybersecurity and Geopolitical video podcast – March 2021 episode | 2021-03-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Making videoconferences more secure

Making videoconferences more secure

Making videoconferences more secure | 2021-03-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

To Patch or Not to Patch in OT – That Is the Real Challenge

To Patch or Not to Patch in OT – That Is the Real Challenge

The objective of an organization when implementing cybersecurity controls is to eliminate risk, but this oftentimes involves settling for managing risk at an acceptable level. Each organization defines what that acceptable level is depending on several factors including the environment, the criticality of function, the asset type, etc. There are many methods and techniques that an organization can then use to manage this risk. One of the most commonly used methods is patching. At the…

Read More

Four Strategies to Mitigate Pass-the-Cookie Attacks

Four Strategies to Mitigate Pass-the-Cookie Attacks

Another year, another new set of cybersecurity threats to overcome, outwit and mitigate against. At the beginning of 2021, the cybersecurity world was informed by CISA (the USA Cybersecurity and Infrastructure Security Agency) of a spate of attacks targeting cloud environment configurations, supposedly occurring as a result of the increase in remote working. Once you add to the mix the fact that corporate and personal devices were being used – often simultaneously – to access…

Read More
1 2,353 2,354 2,355 2,356 2,357 2,557