Quarter of CISOs and IT Leaders Self-Medicate as Pandemic Stress Spikes

Quarter of CISOs and IT Leaders Self-Medicate as Pandemic Stress Spikes

An increase in work-related stress and a lack of paid leave opportunities during COVID-19 have raised concerns that some IT and security executives may be self-medicating to cope with the extra pressure. Security vendor OneLogin polled 250 tech leaders across the globe to compile its IAMokay Mental Health Survey. It found that over three-quarters (77%) believe the pandemic has increased workplace stress while 86% also reported an increase in workload. A quarter (25%) reported that they…

Read More

Colonial Reportedly Paid $5 Million Ransom

Colonial Reportedly Paid  Million Ransom

Ransomware surged 102% year-on-year at the start of 2021 as it emerged that Colonial Pipeline agreed to pay $5 million to extorters after a crippling attack that began last week. The East Coast fuel pipeline was offline for five days after an attack struck last Thursday. However, contrary to initial reports that it refused to engage with the DarkSide threat group, the company actually paid within hours of the attack, two people familiar with the…

Read More

How to select a cybersecurity framework to protect your greatest assets: People, property and data

How to select a cybersecurity framework to protect your greatest assets: People, property and data

How to select a cybersecurity framework to protect your greatest assets: People, property and data | 2021-05-13 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

Case Study: Multicare Health System takes security to the next level

Case Study: Multicare Health System takes security to the next level

Case Study: Multicare Health System takes security to the next level | 2021-05-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Tools and training for security professionals | 2021-05-14

Tools and training for security professionals | 2021-05-14

Tools and training for security professionals | 2021-05-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

FBI and Australia ACSC agencies warn of ongoing Avaddon ransomware attacks

FBI and Australia ACSC agencies warn of ongoing Avaddon ransomware attacks

The FBI and Australian Australian Cyber Security Centre (ACSC) warn of an ongoing Avaddon ransomware campaign targeting organizations worldwide. The Federal Bureau of Investigation (FBI) and the Australian Cyber Security Centre (ACSC) are warning of an ongoing Avaddon ransomware campaign targeting organizations worldwide in multiple industries, including government, finance, energy, manufacturing, and healthcare. The alert published by the ACSC provides a list of countries under attack which includes the US, UK, Germany, France, China, Italy Brazil,…

Read More

The Case for Open XDR

The Case for Open XDR

The current model for cybersecurity is broken. It consists of acquiring and deploying a lot of stand-alone tools, each with its own console, to analyze logs or traffic and detect anomalies that could be threats. In this model, it’s up to each security analyst to communicate with other analysts to determine whether each tool’s individual detection (each of which, by itself, may look benign), can correlate with other detections from other tools to reveal a…

Read More

Biden’s executive order faces challenges trying to beef up US cybersecurity

Biden’s executive order faces challenges trying to beef up US cybersecurity

The EO is designed to protect federal networks, foster information sharing between the government and private sector, and better respond to cyber incidents. But will it do the trick? Image: iStock/tupungato Alarmed by recent cyberattacks involving SolarWinds, Microsoft Exchange and now Colonial Pipeline, the White House is taking action to try to shore up the cyber defenses of the United States. On Wednesday, President Biden signed an executive order that aims to strengthen the nation’s…

Read More

Elon Musk and SNL: Scammers Steal Over $10 Million in Fake Bitcoin, Ethereum and Dogecoin Crypto Giveaways

Elon Musk and SNL: Scammers Steal Over  Million in Fake Bitcoin, Ethereum and Dogecoin Crypto Giveaways

In the run up to Elon Musk hosting NBC’s Saturday Night Live and the potential mention of Dogecoin on the show, scammers quickly capitalized on his appearance by promoting fake giveaways on Twitter and YouTube. Background On May 8, Elon Musk hosted NBC’s Saturday Night Live. Musk, who is a known supporter of the cryptocurrency Dogecoin, teased the possibility that he might talk about the coin on the show, which led to much online speculation….

Read More

How to connect Ubuntu Linux Desktop 21.04 to an Active Directory domain

How to connect Ubuntu Linux Desktop 21.04 to an Active Directory domain

Canonical has made it easy for admins to join Ubuntu Desktop to Active Directory domains. Jack Wallen walks you through the steps. Image: iStock/LeoWolfert Ubuntu 21.04 was made available last month, and it has been quite the hit with both end users and businesses. Although you won’t find a massive amount of new features, what is there should be considered a significant step forward for enterprise and other business use cases. One particular feature that…

Read More
1 2,384 2,385 2,386 2,387 2,388 2,685