Digital Marriage—Making Sure Your Online Wedding is Safe and Secure | McAfee Blogs Keep Your Online Wedding Away from Prying Eyes | McAfee Blog

Digital Marriage—Making Sure Your Online Wedding is Safe and Secure | McAfee Blogs Keep Your Online Wedding Away from Prying Eyes | McAfee Blog

Digital Marriage—Making Sure Your Online Wedding is Safe and Secure Love finds a way. Even in a pandemic.  Across this year and last, a growing number of couples are sticking to their wedding dates as planned, yet with a twist—they’re holding them online. Whether to comply with local guidance, accommodate friends and family who cannot travel, or some mix of both, online weddings are indeed happening. They take many forms—from streaming a small ceremony at…

Read More

SolarWinds attack: Cybersecurity experts share lessons learned and how to protect your business

SolarWinds attack: Cybersecurity experts share lessons learned and how to protect your business

The highly sophisticated SolarWinds attack was designed to circumvent threat detection—and it did, for much too long. Two cybersecurity experts share some valuable lessons learned from the attack. Image: iStock/BalkansCat The recent SolarWinds supply-chain attack went undetected for months. The earliest suspicious activity was detected in September 2019; by Dec. 12, stakeholders were notified, and a formal investigation by law enforcement, intelligence teams, and branches of the US government was launched.  Following the attack, announcement,…

Read More

A Fifth of Sunburst Backdoor Victims from Manufacturing Industry

A Fifth of Sunburst Backdoor Victims from Manufacturing Industry

Nearly a fifth of organizations hit by the Sunburst backdoor emanating from the SolarWinds supply chain attack are from the manufacturing sector, a new analysis from Kaspersky has revealed. While researchers have already uncovered technical details of the Sunburst backdoor that was embedded in the SolarWinds incident late last year, information of the full impact of the attack is still being investigated. It has been officially confirmed that around 18,000 users may have installed backdoor…

Read More

Best practices in applying MITRE ATT&CK to your organizational security

Best practices in applying MITRE ATT&CK to your organizational security

Best practices in applying MITRE ATT&CK to your organizational security | 2021-01-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Identifying data terms can improve cybersecurity efficiency

Identifying data terms can improve cybersecurity efficiency

The term “data” is vague. Knowing the types of data helps companies protect themselves and better recover from a cyberattack. Image: Getty Images/iStockphoto You may know where your data is, but do you also know what the data consists of? “Imagine you’re at a party. You ask someone you’ve just met what they do for a living, and they answer: ‘I work in data,’” said Sky Cassidy, CEO of MountainTop Data, in an email interview….

Read More

#DataPrivacyDay: Organizations Must Increase Focus on Data Privacy in 2021

#DataPrivacyDay: Organizations Must Increase Focus on Data Privacy in 2021

Organizations must be far more focused on data privacy issues this year, according to a panel of experts speaking during the Spirion webinar Customer Data Privacy 2021: It’s No Longer Just Business, It’s Personal. The panel began by setting out the trends that have pushed data privacy issues to the fore over recent years. These include the growth and fragmentation of data privacy legislation, both in the US and across the world, which has expanded…

Read More
1 2,564 2,565 2,566 2,567 2,568 2,688