Poor Remote Working Behaviors and Procedures Putting Orgs at Risk

Poor Remote Working Behaviors and Procedures Putting Orgs at Risk

One-fifth of remote workers in the UK recycle their work email or password to log into consumer websites and apps, such as online shopping and even dating, increasing the risk of their corporate credentials being stolen. This is according to Ivanti’s Secure Consumer Cyber Report, which surveyed 1000 UK home workers about their cybersecurity behaviors. The research revealed that poor cybersecurity practices by home workers are prevalent, which is putting organizations at greater risk of cyber-attacks….

Read More

Medical Data of 500,000 French Residents Leaked Online

Medical Data of 500,000 French Residents Leaked Online

Sensitive medical data belonging to nearly half a million French people has been stolen and leaked online, according to a joint investigation by news source Libération and French cybersecurity blog Zataz. The exposed data, which can be accessed from multiple sites, includes names, phone numbers, and postal addresses of 491,840 individuals. In some cases, it is accompanied by identifying information including Social Security number, birth date, blood type, GP, health insurance provider, medical treatments, HIV status, and pregnancy test results. …

Read More

How to combat the latest security threats in 2021

How to combat the latest security threats in 2021

Understanding the nature of the latest threats can help you identify shifts in tactics and techniques, prioritize security resources and test the most likely scenarios, says IBM X-Force. Image: Getty Images/iStockphoto 2020 saw a boom in cyberattacks with cybercriminals taking advantage of the coronavirus pandemic and lockdown to stage ransomware campaigns, deploy malware, exploit vulnerabilities and commit data breaches. Though we’re now in a new year, bad actors are not only likely to deliver more…

Read More

5 minutes with Mike Hamilton – The biggest threats to the critical infrastructure

5 minutes with Mike Hamilton – The biggest threats to the critical infrastructure

5 minutes with Mike Hamilton – The biggest threats to the critical infrastructure | 2021-02-24 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

10 tips for protecting your cloud data and accounts

10 tips for protecting your cloud data and accounts

As more organizations migrate to the cloud, cybercriminals are taking advantage of the vulnerabilities in online apps, says Netskope. Image: danijelala, Getty Images/iStockPhoto The quest for digital transformation has been driving more organizations to move their data and other resources to the cloud. The coronavirus pandemic and the abrupt shift to remote work have put these cloud migration initiatives in even higher gear. But this quick transition has naturally caught the eye of cybercriminals who…

Read More

Kroger data breach highlights urgent need to replace legacy, end-of-life tools

Kroger data breach highlights urgent need to replace legacy, end-of-life tools

Attackers used an outdated File Transfer Appliance from Accellion to gain access to data, the company said. Getty Images/iStockphoto Kroger became the latest major company to announce a data breach, acknowledging in a statement that information from some current and former employees as well as customers of Kroger Health and Money Services were impacted by an attack on a third-party file transfer tool from Accellion.  The company said it is in the process of contacting…

Read More

Tenable Named to CRN’s 2021 Security 100 List

Tenable Named to CRN’s 2021 Security 100 List

The company’s channel leadership team was also recognized as CRN® Channel Chiefs Tenable®, Inc., the Cyber Exposure company, today announced that CRN®, a brand of The Channel Company, has named Tenable to its annual Security 100 list which recognizes leading IT channel security vendors. Three of Tenable’s channel leaders were also recognized by CRN as Channel Chiefs for their work and commitment to the Tenable Assure Partner Program.  Organizations around the world are turning to…

Read More

Ransomware threats to watch for in 2021 include crimeware-as-a-service

Ransomware threats to watch for in 2021 include crimeware-as-a-service

BlackBerry researchers see more double-extortion ransomware attacks, attackers demanding ransom from healthcare patients, and rising bitcoin prices driving the growth of ransomware. Image: vchal, iStockphoto Ransomware has become an increasingly virulent threat targeting businesses, government agencies, schools, and even individuals. As ransomware attacks gained greater traction and variety in 2020, so too will they bring about more developments in 2021. A report released Wednesday by BlackBerry highlights several trends to watch for in the year…

Read More

IT Security Firm Kaseya Acquires SOC Platform RocketCyber

IT Security Firm Kaseya Acquires SOC Platform RocketCyber

Kaseya, a provider of IT and security management solutions for managed service providers (MSPs) and small- to medium-sized businesses (SMBs), has announced the acquisition of managed security operations center (SOC) platform RocketCyber. RocketCyber will continue to operate as an independent business within Kaseya, led by CEO and co-founder, Carl Banzhof, in Dallas, Texas. Kaseya’s new SOCs will be located in Dallas, Texas, Miami, Florida and Dublin, Ireland, the company confirmed. “The addition of RocketCyber makes Kaseya IT…

Read More

GitOps and the Cloud Operating Model – VMware Cloud Community

GitOps and the Cloud Operating Model – VMware Cloud Community

GitOps is becoming an essential part of the cloud operating model, enabling the application of DevOps best practices to the management of infrastructure, improving the speed and quality of infrastructure service delivery, and maturing infrastructure operations.    “GitOps” is one of the more recent additions to the DevOps lexicon – a play on the Git version control system and operations. Yet it is more than just another catchy compound buzzword. It describes an operational model…

Read More
1 2,387 2,388 2,389 2,390 2,391 2,554