BBC Reports Theft of 105 Electrical Devices

BBC Reports Theft of 105 Electrical Devices

The BBC has reported the theft of 105 electrical devices from its premises over the last two years, according to data obtained following a Freedom of Information (FoI) request by litigation firm Griffin Law. The findings have raised fears that confidential information contained in these devices will have fallen into the hands of malicious actors. A total of 35 mobile phones were stolen over the two years from the premises of the UK’s public service…

Read More

CIS Offers Free DNS Security Tool for US Hospitals

CIS Offers Free DNS Security Tool for US Hospitals

A leading internet non-profit is offering US hospitals a free DNS security tool designed to help protect them from ransomware and other threats. The Center for Internet Security (CIS) announced on Friday that its Malicious Domain Blocking and Reporting Service (MDBR) would be made available at no cost to all non-public hospitals. The MDBR works by monitoring and blocking any outbound DNS traffic headed for suspicious domains. “Once an organization points its domain name system…

Read More

The big debate: control compliance vs. risk management

The big debate: control compliance vs. risk management

When it comes to managing and mitigating technology risk, IT teams have traditionally relied on operational, control-compliance approaches focused on information security. The rest of the business, meanwhile, has probably adopted broader, business-focused risk management frameworks. This disconnect can sometimes inhibit IT leaders’ ability to effectively articulate technology risk to business stakeholders, which can impact investment decisions. For effectively managing IT risk, there’s room for both approaches, because there are benefits found in each method….

Read More

Industrial Cyber Security and the Florida water supply attack

Industrial Cyber Security and the Florida water supply attack

Through the lens of the Florida water supply hack, Dale Peterson teaches how events like these remind us to take the necessary steps to maintain our cybersecurity. Founder and chair of S4 Events, Dale has been helping security professionals effectively and efficiently manage risk to their critical assets for over 15 years. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 Tim Erlin: Welcome everyone to the Tripwire Cybersecurity Podcast. I am Tim Erlin, vice president of product management…

Read More

Proofpoint Enters into Definitive Agreement to Acquire InteliSecure; Augments People-Centric Managed Services Offering | Proofpoint US

Proofpoint Enters into Definitive Agreement to Acquire InteliSecure; Augments People-Centric Managed Services Offering | Proofpoint US

Proofpoint’s Enterprise DLP solution across cloud, email and endpoint boosted by proven managed services to help companies build and operate world-class data protection programs SUNNYVALE, Calif., February 22, 2021 – Proofpoint, Inc. (NASDAQ: PFPT), a leading cybersecurity and compliance company, has entered into a definitive agreement to acquire InteliSecure, Inc. (“InteliSecure”), an innovator in data loss protection managed services. With this acquisition, Proofpoint looks to strengthen its cloud-based people-centric security platform by enhancing customers’ ability to…

Read More

Effective video collaboration: What you need to consider before investing in a system

Effective video collaboration: What you need to consider before investing in a system

Effective video collaboration: What you need to consider before investing in a system | 2021-02-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Reshaping cybersecurity in the Remote Work Era

Reshaping cybersecurity in the Remote Work Era

Reshaping cybersecurity in the Remote Work Era | 2021-02-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Making sense of resilience in a shifting global environment

Making sense of resilience in a shifting global environment

Making sense of resilience in a shifting global environment | 2021-02-22 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Are Your IT Infrastructures 2021 Cybersecurity Compliant?

Are Your IT Infrastructures 2021 Cybersecurity Compliant?

It’s an unfortunate fact that cybersecurity is rarely the foremost of concerns among small- to medium-sized businesses. However, investing in cybersecurity is becoming even more important as these organizations undergo digital transformation. It may seem like there are more important priorities on which a small business could focus, but putting your company and your customers at risk of a cyberattack can have huge consequences. Your reputation may suffer as your customers deal with potential financial…

Read More

Top 100 Cybersecurity Breaches

Top 100 Cybersecurity Breaches

Looking back over the past year, it’s impossible not to recognize the widespread data breaches that have caused such chaos. Secret and sensitive data of hundreds of millions of people and companies has been decrypted and exposed and then sold. Data breaches are a terrifying trend in the world of cybercrime, which shows no signs of slowing down just yet.   We’re looking at billions of records stolen and this trend is only getting worse.  Here…

Read More
1 2,544 2,545 2,546 2,547 2,548 2,706