Bumble Launches Online Safety Guide

Bumble Launches Online Safety Guide

The dating application Bumble has launched a new online safety initiative to help protect women in India from online abuse.  Stand for Safety was created in collaboration with Safecity, an Indian-based public safety platform owned by the Red Dot Foundation. The goal of the initiative is to help women identify, prevent, and tackle negative online behavior including bullying, aggression, and hateful comments. News of the initiative follows a recent survey conducted by Bumble that found that most (83%) women…

Read More

#LORCALive: More Work Required to Realize the Potential of AI in Cybersecurity

#LORCALive: More Work Required to Realize the Potential of AI in Cybersecurity

The main issues and trends in regard to the use of AI in cybersecurity were discussed by Robert Hannigan, senior executive of BlueVoyant and chair the LORCA advisory board, speaking during the LORCA Live online event. Hannigan began by explaining that AI is often confused with automation, and that the two need to be distinguished. He defined AI as “machines that act intelligently on data” and “it’s not just about doing things at greater scale…

Read More

Linux 101: How to give users sudo privileges on Ubuntu and Red Hat-based Linux distributions

Linux 101: How to give users sudo privileges on Ubuntu and Red Hat-based Linux distributions

New Linux admins need to know how to give and take sudo privileges from users. Jack Wallen shows you how on both Ubuntu- and Red Hat-based Linux distributions. Image: Pixabay Most users on your Linux machines might be non-admins who use services and directories for various purposes. However, you might come into a situation when you need to “promote” one of those users to admin and give them sudo privileges.  How do you do that? …

Read More

5 Ways MVISION XDR Innovates with MITRE ATT&CK   | McAfee Blogs

5 Ways MVISION XDR Innovates with MITRE ATT&CK   | McAfee Blogs

The MITRE ATT&CK® Framework proves that authority requires constant learning and the actionable information it contains has never held greater currency. Likewise, XDR, the category of extended detection and response applications, is quickly becoming accepted by enterprises and embraced by Gartner analysts, because they “improve security operations productivity and enhance detection and response capabilities.”   It is less well known how these tools align to improve the efficacy of your cybersecurity defenses leveraging key active cyber security industry frameworks. In MVISION XDR there’s a dynamic synergy between the MITRE ATT@CK Framework and…

Read More

ClubCISO Appoints Stephen Khan as its New Chair

ClubCISO Appoints Stephen Khan as its New Chair

ClubCISO, the international community of chief information security officers and security leaders, has announced the appointment of Stephen Khan as its new chair. Khan is head of technology and cybersecurity risk at HSBC Group Information Security Risk, and is also the current chair of the White Hat Ball. Khan has replaced Dr Jessica Barker as chair at ClubCISO, who will remain on the non-commercial organizations’ advisory board after serving two years as chair. Khan will…

Read More

Hades Ransomware Linked to Hafnium and Exchange Attacks

Hades Ransomware Linked to Hafnium and Exchange Attacks

Security experts have linked the Hades ransomware operation to the Hafnium state-backed group that was behind early attacks on Microsoft Exchange servers. The ransomware crew was responsible for attacks on trucking giant Forward Air and a handful of others. It has been linked to infamous Russian cybercrime operation Evil Corp (Indrik Spider), as a new variant of its WasterdLocker ransomware, designed to help the group escape sanctions that would discourage victims to pay up. However,…

Read More

Knowing where the line is in IT risk management

Knowing where the line is in IT risk management

Every organization should have an agreed understanding of risk, what that means for the company, and where the line of acceptability is (threshold). Knowing where this line is, and using it as a driving force for decision making within IT, can dramatically maximize resources and decrease costs.  Decision making Risk Management sometimes has the unfortunate nickname of being titled the Business Prevention Unit (BPU), but actually, that name couldn’t be further from the truth. Robust…

Read More

Infosecurity Magazine Spring Online Summit Now Available On-Demand

Infosecurity Magazine Spring Online Summit Now Available On-Demand

Last week (March 23 and 24) Infosecurity Magazine hosted its annual Spring Online Summit – a two-day virtual event showcasing 14 live, CPE-accredited sessions moderated by the Infosecurity editorial team, featuring an array of experts and thought-leaders discussing various topics and issues currently impacting the information security industry. Infosecurity is delighted to announce that the full event is now available to watch on-demand via the Infosecurity website. The immersive education program includes keynote presentations from…

Read More

UK’s CNI Security Threatened by Staff Burnout

UK’s CNI Security Threatened by Staff Burnout

The security of the UK’s transport, energy and other critical national infrastructures (CNI) could be threatened by staff burnout and IT skills shortages, according to new research from cybersecurity services company Bridewell Consulting. The firm discovered that, in the last year, 85% of IT decision-makers working to protect Britain’s infrastructure have felt increased pressure to improve cybersecurity controls. Of those, 47% have suffered unsustainable stress, 41% have been absent because of burnout, 32% are looking…

Read More

German MPs Hit by Russian-Backed Phishing Attacks

German MPs Hit by Russian-Backed Phishing Attacks

German lawmakers have been targeted once again by phishing attacks reportedly linked to Russian intelligence services. Local reports claimed yesterday that seven members of the Bundestag and 31 members of the state parliament had their inboxes compromised, although these appear to have been personal rather than official accounts. The phishing emails were spoofed to appear as if urgent messages sent by providers GMX and T-Online. The politicians belong to governing parties the CDU/CSU and SPD….

Read More
1 2,430 2,431 2,432 2,433 2,434 2,654