How the CIS Foundations Benchmarks Are Key to Your Cloud Security

How the CIS Foundations Benchmarks Are Key to Your Cloud Security

Many organizations are migrating their workloads to the cloud. But there are challenges along the way. Specifically, security leaders are concerned about their ability to protect their cloud-based data using secure configurations. Tripwire found this out when it partnered with Dimensional Research to survey 310 professionals who held IT security responsibilities for their organizations’ public cloud environments across more than a dozen different sectors. In that study, 37% of respondents told Tripwire that their risk…

Read More

Threat Actors Capitalize on COVID-19 Vaccine News to Run Campaigns, AWS Abused to Host Malicious PDFs

Threat Actors Capitalize on COVID-19 Vaccine News to Run Campaigns, AWS Abused to Host Malicious PDFs

Key Findings Malicious actors have targeted the vaccine supply chain and leaked materials stolen from the European Medicines Agency (EMA). Phishing campaigns have evolved alongside the pandemic, with the latest observed themes being vaccine-related topics. Users should remain cautious of possible phishing attacks via email, text messages (SMS), or just click through search results. Overview Threat actors change and adapt their campaigns to mirror themes prevalent in the public eye. When they leverage high-urgency trends,…

Read More

Medical Researcher Jailed for Selling Secrets to China

Medical Researcher Jailed for Selling Secrets to China

The United States has imprisoned a woman who admitted conspiring with her husband to steal secret research from an Ohio’s children’s hospital and selling the stolen data to China. Hospital researcher Li Chen pleaded guilty in July 2020 to conspiring to commit wire fraud and to stealing scientific trade secrets related to exosomes and exosome isolation from Nationwide Children’s Hospital’s Research Institute for her own personal financial gain.  The 47-year-old former resident of Dublin, Ohio, was yesterday sentenced to…

Read More

Indiana Launches Cyber Blog

Indiana Launches Cyber Blog

The state of Indiana has launched a new blog to promote cybersecurity best practices and share tips on how to stay cyber-safe.  The Indiana Cyber Blog is hosted on the Hoosier State’s Cybersecurity Hub website, where residents can go to report a cybercrime, research cyber training courses and careers, and get the low-down on the latest digital threats. Posts will cover a wide range of topics, including data privacy, identity theft awareness, strong password creation, and how…

Read More

South Carolina County Still Reeling from January Cyber-Attack

South Carolina County Still Reeling from January Cyber-Attack

The road to recovery is proving to be a long one for a South Carolina county targeted by cyber-attackers last month. Georgetown County’s network was brought down by cyber-criminals on January 23 in what officials described as a “major infrastructure breach.”  While 911 systems and operations at the Georgetown County Detention Center were unaffected by the attack, the county’s electronic systems and email were disrupted.  Ten days after the attack took place, cybersecurity experts are still working…

Read More

The Privileged Credential Security Advantage

The Privileged Credential Security Advantage

By Tony Goulding, Cybersecurity Evangelist at Centrify Over time, a causality has emerged that accounts for the majority of security risks for enterprises: privileged accounts lead to data breaches. So much so that the majority of breaches (over 67 percent) in 2020 were caused by credential theft. Organizations that prioritize privileged credential security have an advantage over their peers by ensuring their operations are more resilient to data breaches. However, there’s a gap that continues…

Read More

Check your Zoom background to remove sensitive personal-identifying items (or go virtual)

Check your Zoom background to remove sensitive personal-identifying items (or go virtual)

Opening up a window into your home workspace may be riskier than you think as hackers target employees to infiltrate corporate networks. Image: Getty Images/iStockphoto Before your next video call, take a minute to scan your background. If you have a diploma on your wall or paperwork on your desk that shows your name and address, take a minute to stash that stuff. Anything that shows names, numbers, or addresses could be helpful to hackers…

Read More

CISOs: Vendor Relationships a Factor in Ongoing Remote Working Vulnerabilities

CISOs: Vendor Relationships a Factor in Ongoing Remote Working Vulnerabilities

The IT infrastructure of UK businesses continues to be at high risk of cyber-attacks as a result of home working, according to a new study by Kaspersky. IT leaders highlighted a disconnect between organizations and security vendors as a primary factor in this ongoing risk. The survey of 240 CISOs and 2000 UK workers showed that insecure staff behaviors remain prevalent, nearly a year since the mass shift to remote working as a result of COVID-19….

Read More

Integrating Azure Application Gateway for Load Balancing workloads in AVS (Step by Step Guide) – VMware Cloud Community

Integrating Azure Application Gateway for Load Balancing workloads in AVS (Step by Step Guide) – VMware Cloud Community

With Azure VMware Solution (AVS), now available globally in Microsoft Azure as a native Azure Cloud offering from Microsoft, customers around the globe can enjoy the same world class industry leading VMware technologies in Azure cloud.   In this article, I will be discussing and highlighting how we can leverage and integrate Azure Native Cloud services such as Azure Application Gateway (AAG) with VMware based workload that are hosted in Azure VMware Solution (AVS). I…

Read More

Palo Alto Networks to Announce Fiscal Second Quarter 2021 Financial Results on Monday, February 22, 2021

Palo Alto Networks to Announce Fiscal Second Quarter 2021 Financial Results on Monday, February 22, 2021

SANTA CLARA, Calif., Feb. 2, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, announced today that it will release the financial results for its fiscal second quarter 2021, ended January 31, 2021, after U.S. markets close on Monday, February 22, 2021. Palo Alto Networks will host a video webcast that day at 1:30 p.m. Pacific time (4:30 p.m. Eastern time) to discuss the results. The live video webcast will be accessible from…

Read More
1 2,420 2,421 2,422 2,423 2,424 2,549