SolarWinds attack explained: And why it was so hard to detect

SolarWinds attack explained: And why it was so hard to detect

The recent breach of major cybersecurity company FireEye by nation-state hackers was part of a much larger attack that was carried out through malicious updates to a popular network monitoring product and impacted major government organizations and companies. The incident highlights the severe impact software supply chain attacks can have and the unfortunate fact that most organizations are woefully unprepared to prevent and detect such threats. A hacker group believed to be affiliated with the…

Read More

SolarWinds: Our Office 365 Emails Were Compromised

SolarWinds: Our Office 365 Emails Were Compromised

The company at the center of revelations over a widespread Russian information-stealing campaign has said that fewer than 18,000 of its global customers were affected. SolarWinds produces popular software that helps organizations manage their IT networks and infrastructure. However, it was revealed by FireEye that attacks which compromised the security vendor and US government departments had used the software as a key attack vector. In a way not dissimilar to the NotPetya attacks of 2017…

Read More

Retail Sector Takes Additional Precautions Ahead of the 2020 Holidays

Retail Sector Takes Additional Precautions Ahead of the 2020 Holidays

Coronavirus 2019 (COVID-19) stopped many things in 2020. While in-store holiday shopping may be greatly reduced for some, there’s still a lot of shopping happening online. Near the end of November 2020, Statista revealed that holiday retail sales were expected to grow approximately 3.6% over the previous year. And Adobe Analytics reported that online sales would likely rise 33% to a record $189 billion. CNBC clarified that this number condenses two years’ worth of economic…

Read More

9 best practices to achieve effective cloud security

9 best practices to achieve effective cloud security

9 best practices to achieve effective cloud security | 2020-12-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

It’s time to modernize the voting process

It’s time to modernize the voting process

It’s time to modernize the voting process | 2020-12-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Two factor authentication: Two steps forward, one step back

Two factor authentication: Two steps forward, one step back

Two factor authentication: Two steps forward, one step back | 2020-12-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Adapting your security operations to the remote work environment

Adapting your security operations to the remote work environment

Adapting your security operations to the remote work environment | 2020-12-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Self Care – Lessons from Teaching Cybersecurity: Week 11

Self Care – Lessons from Teaching Cybersecurity: Week 11

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python course aimed at high school students that I’m teaching…

Read More

Strike a balance: Ensuring secure remote work without hindering productivity

Strike a balance: Ensuring secure remote work without hindering productivity

Remote work will be a permanent scenario for many organizations, according to the CIO Pandemic Business Impact Survey 2020. This underscores the need for policies that secure remote data access without inhibiting user productivity. “Given the paradigm shift to remote work, companies must protect their IT infrastructure — including networks, application servers, and VPN access points — against distributed denial-of-service attacks comprehensively on all levels and across all platforms,” says Mark Wilczek (@MarcWilczek), COO at…

Read More

5 building blocks of a well-developed security culture

5 building blocks of a well-developed security culture

A defined security culture is helping the financial industry, though the fundamentals should apply to any business. Image: Getty Images/iStockphoto I remember watching a bank being built. After the concrete foundation and ground floor were in place, workers began building a massive concrete and steel box right in the middle of the building’s floor. It finally dawned on me: That was the vault. It seemed impenetrable.  Financial institutions are hypervigilant when it comes to security….

Read More
1 2,472 2,473 2,474 2,475 2,476 2,541