3 Ways to Adapt Your Cybersecurity Messaging for Generation Z

3 Ways to Adapt Your Cybersecurity Messaging for Generation Z

1. Find the Best Channels to Share Cybersecurity Messaging To keep students informed and updated about issues, EDUCAUSE recommends creating “campus-based information security awareness campaigns.” This means helping students learn what they can do as individuals to keep their devices safe. As effective messaging channels, colleges might consider video and in-person learning opportunities. Corey Seemiller, a researcher and author of Generation Z Goes to College, notes that 90 percent of Gen Z students seek new information…

Read More

The Hidden Costs of Cybercrime on Government | McAfee Blogs

The Hidden Costs of Cybercrime on Government | McAfee Blogs

Organizations across the country – from the private sector to the federal government –  have become more digital, especially following the shift to remote work this year. It’s no surprise that cybercriminals around the world have taken notice. According to a new report by McAfee and the Center for Strategic and International Studies (CSIS), cybercrime is now a nearly trillion-dollar industry, and the government sector is not immune. Across the board, the issue continues to rise –…

Read More

Ransomware Attacks Surge in Q3 as Cyber-Criminals Shift Tactics

Ransomware Attacks Surge in Q3 as Cyber-Criminals Shift Tactics

A record growth in ransomware attacks took place in Q3 of 2020 compared to Q2, from 39% to 51% of all malware attempts, according to Positive Technologies’ Cybersecurity Threatscape: Q3 2020 report. The study also found that hacking accounted for 30% of all attacks during Q3, with cyber-criminals reducing their emphasis on social engineering tactics compared with earlier this year. The researchers noted that the percentage of social engineering attacks using COVID-19 as a lure fell…

Read More

6 modern data stack trends to look for in 2021

6 modern data stack trends to look for in 2021

TechRepublic spoke with dozens of experts who said the influx of companies interested in doing more with their data is only increasing. Data has become the name of the game for almost every enterprise as companies and organizations look for more ways to stay ahead of the curve and identify past mistakes.  TechRepublic spoke with industry leaders and experts who discussed six topics and ideas that will emerge in 2021 related to the modern data…

Read More

Gallagher Appoints Three New Cybersecurity Specialists

Gallagher Appoints Three New Cybersecurity Specialists

Insurance broker Gallagher has announced the appointment of three new cybersecurity specialists to grow its cyber-risk knowledge, thereby helping clients better prepare themselves against attacks. The appointments are designed to enhance Gallagher’s cyber-practice within its UK retail division, which provides clients with cyber-protection and insurance cover to prevent cyber-incidents in addition to protection in the event they suffer a cyber-attack. Jay Lucas has taken on the role of cyber-risk technical lead, in which he will…

Read More

Don’t let miscommunication lead to lapses in cybersecurity

Don’t let miscommunication lead to lapses in cybersecurity

With cybersecurity issues, it’s especially important that users understand the information provided by IT and leadership. Here are tips on dealing with the “curse of knowledge.” Image: iStockphoto/fizkes The curse of knowledge is a well-known concept to those steeped in psychology, but likely unfamiliar to the rest of us. That’s too bad, as not understanding what it means and how it affects us can lead to lapses in a company’s cybersecurity. We may not know…

Read More

WSL 2 GPU Support is Here – Docker Blog

WSL 2 GPU Support is Here – Docker Blog

At Microsoft Build in the first half of the year, Microsoft demonstrated some awesome new capabilities and improvements that were coming to Windows Subsystem for Linux 2 including the ability to share the host machine’s GPU with WSL 2 processes. Then in June Craig Loewen from Microsoft announced that developers working on the Windows insider ring machines could now make use of GPU for the Linux workloads. This support for NVIDIA CUDA enabled developers and…

Read More

The Coming Security Perspectives – Cyber Defense Magazine

The Coming Security Perspectives – Cyber Defense Magazine

By Milica D. Djekic It appears that today’s world landscape is under constant and chronical attack of security challenges. There is no time in history that was easy and it’s obvious why the modern days are tough as well. On the surface, the situation can seem well-balanced and manageable, but it takes a lot of effort to maintain the stuff being normal at least from the public’s point of view. The security career is hard…

Read More

A Google Cloud Platform Primer with Security Fundamentals

A Google Cloud Platform Primer with Security Fundamentals

We’ve previously discussed best practices for securing Microsoft Azure and Amazon Web Services but, this time, we are going to turn our attention to Google Cloud Platform. Google Cloud Platform (GCP) is growing at an impressive 83 percent year over year but generally receives less focus than AWS and Azure. We can use some of our best practice cloud security knowledge to outline some fundamental steps for keeping Google Cloud Platform secure. 1. Identity and Access Management A general rule of thumb is to use…

Read More

Stolen Card Prices Soar 225% in Two Years

Stolen Card Prices Soar 225% in Two Years

The price of stolen credit card details and cybercrime tools has in many cases seen triple-digit growth over the past two years, according to new dark web research compiled by Flashpoint. The risk intelligence firm trawled some of the more established cybercrime marketplaces across the deep and dark web, across eight categories: from government-issued IDs to DDoS-for-hire services, exploit kits, RDP server access and “fullz.” The cost of credit card dumps soared 225%, from $12.44…

Read More
1 2,461 2,462 2,463 2,464 2,465 2,541