Social engineering: How psychology and employees can be part of the solution

Social engineering: How psychology and employees can be part of the solution

Social engineering is allowing cybercriminals the way in. Learn how to lock that door. Image: iStockphoto/BeeBright There is something those responsible for a company’s cybersecurity must come to terms with: Technology alone is not going to get the job done. It’s time to shift some of the focus from technology to psychology, as even the most sophisticated cybersecurity system has not prevented people from falling victim to social engineering. You may or may not be…

Read More

Kubernetes Observability & Monitoring in the Cloud – VMware Cloud Community

Kubernetes Observability & Monitoring in the Cloud – VMware Cloud Community

In refining full stack visibility, it’s clear that different operations have different needs, and require different tools to monitor and observe the full stack. VMware Cloud Management can help you monitor your Kubernetes installation and the clusters that get deployed on top of that.   As we’ve seen in the previous Kubernetes blog posts (part 1,2,3), more and more IT workloads are getting deployed using Kubernetes. Kubernetes has become the platform of choice for developers to…

Read More

‘Cloud Is’ – Part Four – Technical Debt – VMware Cloud Community

‘Cloud Is’ – Part Four – Technical Debt – VMware Cloud Community

IT resources are critical, and managing IT debt is a full time job. When managing your IT infrastructure is technical debt your top financial priority? Should it be? Let’s take a look at what can be an economic balancing act and see what to consider when deciding your path.   It is the best and worst part of a meeting. After everything from sports analogies, pain and gain, speeds and feeds, and time on the…

Read More

Tenable Achieves ISO 27001 Certification

Tenable Achieves ISO 27001 Certification

Tenable®, Inc. the Cyber Exposure company, today announced it has achieved ISO/IEC 27001:2013 certification, recognizing its proven commitment to the highest level of information security management. Following an extensive audit process, the certification was issued by Schellman & Company LLC. ISO 27001 is a globally recognized standard mandating numerous controls for the establishment, maintenance and certification of an information security management system (ISMS). Tenable’s ISMS is designed to cover all key areas of a robust…

Read More

Top 10 privacy and security stories of 2020

Top 10 privacy and security stories of 2020

As we write this on Wednesday, the massive SolarWinds cyberattack, purportedly perpetrated by Russian intelligence and impacting some 18,000 government agencies and private sector businesses, is just starting to come into focus. So far, the healthcare dimensions of the hack include the apparent targeting of the National Institutes of Health. It appears to be the kind of state-sponsored effort that Sen. Angus King, I-Maine, spoke about during the HIMSS Healthcare Security Forum just this past…

Read More

Why the Education Sector Must Address Security in The Rush to Digitise – Cyber Defense Magazine

Why the Education Sector Must Address Security in The Rush to Digitise – Cyber Defense Magazine

By Jacob Chacko Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba There has never been a greater need to connect students, classrooms, and buildings. Enrolment of students (who are always more tech-savvy and more expectant than the year that preceded them) continues to rise, and the benefits of technology – better grades and greater staff well-being – are necessary if schools are to maintain high levels of performance during…

Read More

Microsoft Set to Quarantine SolarWinds Orion Binaries

Microsoft Set to Quarantine SolarWinds Orion Binaries

Microsoft is preparing to quarantine malicious versions of the SolarWinds Orion application used in recent nation state attacks, in a move that may crash systems. The computing giant had previously released detections to alert customers of its Windows Defender security product if they were running the malicious updates. Although it was recommended that such customers isolate and investigate any such devices, the decision was down to them. However, in an update yesterday Microsoft effectively said…

Read More

New spyware used by sextortionists to blackmail iOS and Android users exposed by Lookout

New spyware used by sextortionists to blackmail iOS and Android users exposed by Lookout

New spyware used by sextortionists to blackmail iOS and Android users exposed by Lookout | 2020-12-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Perfect strangers: How CIOs and CISOs can get along

Perfect strangers: How CIOs and CISOs can get along

A pandemic makes CIOs and CISOs strange bedfellows, and this year they have had to work together more closely than ever under unprecedented circumstances. The result? The state of the relationship has generally improved. Organizations across the board have accelerated their digital initiatives and migrations to the cloud to support remote workers and customers in the past several months. This has “caused people’s risk appetites to shift very, very dramatically and it’s caused CIOs and…

Read More

Paying that ransom request could land you in legal trouble for sanctions violations

Paying that ransom request could land you in legal trouble for sanctions violations

Paying that ransom request could land you in legal trouble for sanctions violations | 2020-12-16 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More
1 2,469 2,470 2,471 2,472 2,473 2,541