A post-pandemic guide to cybersecurity budgeting for 2021

A post-pandemic guide to cybersecurity budgeting for 2021

A post-pandemic guide to cybersecurity budgeting for 2021 | 2021-02-03 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Security teams navigate remote work challenges

Security teams navigate remote work challenges

Security teams navigate remote work challenges | 2021-02-03 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

5 biggest cybersecurity threats

5 biggest cybersecurity threats

5 biggest cybersecurity threats | 2021-02-03 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Ransomware: How They Work and How to Defend Against Them

Ransomware: How They Work and How to Defend Against Them

It is the Tuesday morning after a long weekend. You come into work early to get caught up on emails only to find you are completely locked out. You have been hit by a ransomware attack. You ask yourself, “What happened? And how do I fix it?” This post will explore three of the most significant ransomware families of 2020: Tycoon, Ryuk and REvil. After discussing how these strains work, we’ll share some best practices…

Read More

How the CIS Foundations Benchmarks Are Key to Your Cloud Security

How the CIS Foundations Benchmarks Are Key to Your Cloud Security

Many organizations are migrating their workloads to the cloud. But there are challenges along the way. Specifically, security leaders are concerned about their ability to protect their cloud-based data using secure configurations. Tripwire found this out when it partnered with Dimensional Research to survey 310 professionals who held IT security responsibilities for their organizations’ public cloud environments across more than a dozen different sectors. In that study, 37% of respondents told Tripwire that their risk…

Read More

Threat Actors Capitalize on COVID-19 Vaccine News to Run Campaigns, AWS Abused to Host Malicious PDFs

Threat Actors Capitalize on COVID-19 Vaccine News to Run Campaigns, AWS Abused to Host Malicious PDFs

Key Findings Malicious actors have targeted the vaccine supply chain and leaked materials stolen from the European Medicines Agency (EMA). Phishing campaigns have evolved alongside the pandemic, with the latest observed themes being vaccine-related topics. Users should remain cautious of possible phishing attacks via email, text messages (SMS), or just click through search results. Overview Threat actors change and adapt their campaigns to mirror themes prevalent in the public eye. When they leverage high-urgency trends,…

Read More

Medical Researcher Jailed for Selling Secrets to China

Medical Researcher Jailed for Selling Secrets to China

The United States has imprisoned a woman who admitted conspiring with her husband to steal secret research from an Ohio’s children’s hospital and selling the stolen data to China. Hospital researcher Li Chen pleaded guilty in July 2020 to conspiring to commit wire fraud and to stealing scientific trade secrets related to exosomes and exosome isolation from Nationwide Children’s Hospital’s Research Institute for her own personal financial gain.  The 47-year-old former resident of Dublin, Ohio, was yesterday sentenced to…

Read More

Indiana Launches Cyber Blog

Indiana Launches Cyber Blog

The state of Indiana has launched a new blog to promote cybersecurity best practices and share tips on how to stay cyber-safe.  The Indiana Cyber Blog is hosted on the Hoosier State’s Cybersecurity Hub website, where residents can go to report a cybercrime, research cyber training courses and careers, and get the low-down on the latest digital threats. Posts will cover a wide range of topics, including data privacy, identity theft awareness, strong password creation, and how…

Read More

South Carolina County Still Reeling from January Cyber-Attack

South Carolina County Still Reeling from January Cyber-Attack

The road to recovery is proving to be a long one for a South Carolina county targeted by cyber-attackers last month. Georgetown County’s network was brought down by cyber-criminals on January 23 in what officials described as a “major infrastructure breach.”  While 911 systems and operations at the Georgetown County Detention Center were unaffected by the attack, the county’s electronic systems and email were disrupted.  Ten days after the attack took place, cybersecurity experts are still working…

Read More

The Privileged Credential Security Advantage

The Privileged Credential Security Advantage

By Tony Goulding, Cybersecurity Evangelist at Centrify Over time, a causality has emerged that accounts for the majority of security risks for enterprises: privileged accounts lead to data breaches. So much so that the majority of breaches (over 67 percent) in 2020 were caused by credential theft. Organizations that prioritize privileged credential security have an advantage over their peers by ensuring their operations are more resilient to data breaches. However, there’s a gap that continues…

Read More
1 2,559 2,560 2,561 2,562 2,563 2,688