5 ways IT departments can build trust among their business partners

5 ways IT departments can build trust among their business partners

5 ways IT departments can build trust among their business partners | 2021-03-24 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Debunking the Most Common Cloud Misconfiguration Myths

Debunking the Most Common Cloud Misconfiguration Myths

Do you remember all the apprehension about cloud migration in the early days of cloud computing? Some of the concerns ran the full paranoia gamut from unreliability to massive overcharging for cloud services. Some concerns, such as the lack of security of the entire cloud infrastructure, rose to the level of conspiracy theories. It is nice to know that those myths are all behind us.  Or are they? It seems that many of the earlier misconceptions have…

Read More

REvil continues ransomware attack streak with takeover of laptop maker Acer

REvil continues ransomware attack streak with takeover of laptop maker Acer

REvil previously infected the networks of Honda, the makers of Jack Daniels and a high-profile law firm representing Donald Trump. Image: Acer Cyberattackers behind the REvil ransomware have claimed another victim, this time global laptop conglomerate Acer, and are demanding a record $50 million ransom.  First reported by Bleeping Computer, the attackers announced that they had breached Acer’s systems on Friday by posting financial documents and bank forms from the Taiwanese laptop, desktop and monitor…

Read More

Which is the Threat landscape for the ICS sector in 2020?

Which is the Threat landscape for the ICS sector in 2020?

The Kaspersky ICS CERT published a report that provided details about the threat landscape for computers in the ICS engineering and integration sector in 2020. Kaspersky ICS CERT published a report that provided details about the threat landscape for ICS/SCADA systems in 2020. The experts gathered data related to the cyberthreats that were blocked on computers used to manage industrial control equipment and targeting software used in ICS engineering and integration industry, including human-machine interface…

Read More

Gartner: Top security and risk management trends for 2021

Gartner: Top security and risk management trends for 2021

The 8 top trends cited will enable rapid reinvention, including the skills gap, cybersecurity mesh and identity-first security. Image: iStock/LeoWolfert At Tuesday’s Gartner Security & Risk Management Summit, Gartner Research Vice President Peter Firstbrook discussed eight critical trends for security and risk-management leaders in his keynote address. COVID-19, he said, “accelerates digital business transformation and challenges traditional cybersecurity practices.” Firstbrook also said these trends “are a response to persistent global challenges that all organizations are…

Read More

Why it’s time the Android developers rethink WebView

Why it’s time the Android developers rethink WebView

Jack Wallen offers up his take on the recent issue surrounding Android’s WebView. Image: iStockphoto/marchmeena29 In the past couple of days, Android users found themselves in a rather frustrating situation with random applications crashing when links were opened. It turns out the issue was Android System WebView. That particular application that has been rather problematic over the years. Even back in the early days, WebView was problematic because, with a JavaScript bridge enabled, a webpage…

Read More

#IMOS21: The Critical Role of Culture in DevSecOps

#IMOS21: The Critical Role of Culture in DevSecOps

The approach organizations should take to develop and maintain an effective DevSecOps culture were highlighted by Patrick Debois, director of market strategy at Snyk during a session at the Infosecurity Magazine Online Summit EMEA 2021. Debois firstly emphasized the importance of an organization’s culture in determining the DevSecOps strategy that should be employed. “The CEO and culture of your company will set the tone on the areas upon which your DevSecOps transformation will address,” he commented. Depending on the context, this…

Read More

Fired IT Contractor Jailed for Retaliatory Cyber-Attack

Fired IT Contractor Jailed for Retaliatory Cyber-Attack

An IT contractor who carried out a retaliatory cyber-attack after being fired for underperforming has been sent to prison.  Indian national Deepanshu Kher was hired by an American IT consulting firm in 2017. The firm sent Kher to the headquarters of a company in Carlsbad, California, to assist the business with its migration to a Microsoft Office 365 (MS O365) environment. The company was unhappy with the standard of Kher’s work and wasted no time…

Read More

Paving the way: Inspiring Women in Payments – A podcast featuring Global Payments

Paving the way: Inspiring Women in Payments – A podcast featuring Global Payments

  In recognition of Women’s History Month, the PCI Security Standards Council is pleased to bring you a special edition of our podcast. In this panel discussion, we examine what it means to be female in the tech world with three women from Global Payments, a leading worldwide provider of payment technology and software solutions.

Read More

Advanced Image Management in Docker Hub – Docker Blog

Advanced Image Management in Docker Hub – Docker Blog

We are excited to announce the latest feature for Docker Pro and Team users, our new Advanced Image Management Dashboard available on Docker Hub. The new dashboard provides developers with a new level of access to all of the content you have stored in Docker Hub providing you with more fine grained control over removing old content and exploring old versions of pushed images.  Historically in Docker Hub we have had visibility into the latest…

Read More
1 2,504 2,505 2,506 2,507 2,508 2,720