April is National Supply Chain Integrity Month

April is National Supply Chain Integrity Month

April is National Supply Chain Integrity Month | 2021-04-09 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Brits Still Confused by Multi-Factor Authentication

Brits Still Confused by Multi-Factor Authentication

The British public are still woefully underinformed and unaware of the security benefits of multi-factor authentication (MFA), a new study from the FIDO Alliance has revealed. The industry association, founded in 2012 to promote authentication standards and reduce global reliance on passwords, recently polled over 4000 consumers in the UK, France, Germany and the US. It revealed that half (49%) UK consumers have had their social media accounts compromised or know a friend or family…

Read More

Patch Priority Index for March 2021 | The State of Security

Patch Priority Index for March 2021 | The State of Security

Tripwire’s March 2021 Patch Priority Index (PPI) brings together important vulnerabilities from SaltStack, VWware, BIG-IP and Microsoft. First on the patch priority list this month are patches for vulnerabilities in Microsoft Exchange (CVE-2021-27065, CVE-2021-26855), SaltStack (CVE-2021-25282, CVE-2021-25281), BIG-IP (CVE-2021-22986) and VMware vCenter (CVE-2021-21972). Exploits for these vulnerabilities have been recently added to the Metasploit Exploit Framework. These systems should be patched as soon as possible. Next on the list are patches for Internet Explorer, which…

Read More

Over 90% of Organizations Hit by a Mobile Malware Attack in 2020

Over 90% of Organizations Hit by a Mobile Malware Attack in 2020

Almost every global organization suffered at least one mobile malware attack in 2020, according to a new report from Check Point. The security vendor polled 1800 customers of its Harmony Mobile device threat protection product to compile its 2021 Mobile Security Report. Of the near-total number that faced a mobile attack last year, 93% of incidents originated in a device network, and were either phishing attempts (52%), C&C communication with malware already on the device…

Read More

Man Arrested After Failed AWS Bomb Plot

Man Arrested After Failed AWS Bomb Plot

A Wichita Falls man has been charged after allegedly planning to blow up an Amazon Web Services (AWS) datacenter in Virginia. Seth Aaron Pendley, 28, was arrested last Thursday after procuring what he thought was an explosive device from an undercover FBI officer in Fort Worth. He was charged with a malicious attempt to destroy a building with an explosive, after a concerned individual flagged “alarming” statements he made on a militia group forum under…

Read More

The Gaylord Opryland Resort boosts security

The Gaylord Opryland Resort boosts security

The Gaylord Opryland Resort boosts security | 2021-04-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Timing isn’t everything but it helps

Timing isn’t everything but it helps

Timing isn’t everything but it helps | 2021-04-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls

How Tripwire Can Help U.S. Federal Agencies Implement the CIS Controls

Digital attackers are increasingly launching sophisticated campaigns in an effort to target U.S. federal agencies and other organizations. Two recent examples demonstrate this reality. These are the SolarWinds supply chain attack and the HAFNIUM Exchange exploit campaign. The SolarWinds Supply Chain Attack In mid-December 2020, the security community learned that an advanced persistent threat (APT) had targeted SolarWinds’ Orion network management software with a backdoor. Tripwire VERT warned that the those responsible for the attack…

Read More

More Power, More Responsibility

More Power, More Responsibility

What the Defense and Intelligence Communities Need to Know About 5G By Brian Green, Senior Vice President, Booz Allen Hamilton With the potential to revolutionize global telecommunications, fifth-generation mobile technology (5G) forges connections between physical devices and the digital world – creating new opportunities to share, compute, and act upon information with unprecedented speed and at an unheard-of scale. For the defense and intelligence communities, 5G opens myriad possibilities to address operational needs, enhance mission…

Read More

Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

By Boyd White, Director, Technical Account Management, Tanium Endpoint management is critical as agencies try to secure the knowns and unknowns in their IT environments. As cybercriminals become more sophisticated, IT teams need to not only mitigate known cyber breaches – but also need faster visibility and control when cybercriminals adapt their techniques. The recent threat of compromised software at SolarWinds is a good example of the quick pace in which agencies were forced to…

Read More
1 2,485 2,486 2,487 2,488 2,489 2,731