What’s in Your Wallet? The Cybersecurity Costs of COVID – Cyber Defense Magazine

What’s in Your Wallet? The Cybersecurity Costs of COVID – Cyber Defense Magazine

With new business challenges in play, organizations are shifting their cybersecurity spend accordingly By Mark Sangster, Vice President, and Industry Security Strategist, eSentire If anything has become clear over the past six months, it’s that COVID’s tentacles have crept into almost every facet of our lives, both personal and professional. Most are in ways we could have (and did) predict, but there have been a few surprises along the way, such as teaching pods and…

Read More

Hacking Christmas Gifts: Artie 3000 Drawing Robot

Hacking Christmas Gifts: Artie 3000 Drawing Robot

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift may introduce unexpected vulnerabilities. In this blog series, VERT will be looking at some of the Internet’s best-selling holiday gifts with an eye toward their possible security implications. Some of the risks discussed in this series may be over the top and even comical while…

Read More

Grades and Meeting Standards – Lessons from Teaching Cybersecurity: Week 12

Grades and Meeting Standards – Lessons from Teaching Cybersecurity: Week 12

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python aimed at high school students that I’m teaching weekly….

Read More

SolarWinds roundup: Fixes, new bad actors, and what the company knew

SolarWinds roundup: Fixes, new bad actors, and what the company knew

The SolarWinds Orion security breach is unfolding at a rapid pace, and the number of vendors and victims continues to grow. Each day brings new revelations as to its reach and depth. Of particular concern are the rate of infection and impact on government systems. In case you missed it, a backdoor was found in the SolarWinds Orion IT monitoring and management software. A dynamic link library called SolarWinds.Orion.Core.BusinessLayer.dll, a SolarWinds digitally-signed component of the…

Read More

SolarWinds roundup: Fixes, new bad actors, and the company knew

SolarWinds roundup: Fixes, new bad actors, and what the company knew

The SolarWinds Orion security breach is unfolding at a rapid pace and the number of vendors and victims continues to grow. Each day brings new revelations as to its reach and depth. Of particular concern is the rate of infection and impact on government systems. In case you missed it, a backdoor was found in the SolarWinds Orion IT monitoring and management software. A dynamic link library called SolarWinds.Orion.Core.BusinessLayer.dll, a SolarWinds digitally-signed component of the…

Read More

5 minutes with Ali Golshan – The benefits of DevOps

5 minutes with Ali Golshan – The benefits of DevOps

5 minutes with Ali Golshan – The benefits of DevOps | 2020-12-23 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Cyber Insurance Market Expected to Surge in 2021

Cyber Insurance Market Expected to Surge in 2021

The global cyber insurance market is projected to grow by 21% next year, reaching $9.5bn in value, according to new data by insurance firm Finaria.it. This is as a result of greater recognition of the increasing cyber-threat landscape, exacerbated by the shift to remote working this year. Finaria added that the cyber insurance market is expected to reach $20.4bn by 2025, as more organizations look to protect themselves from malicious actors. In its analysis, the…

Read More

SASE check list: 7 key evaluation criteria

SASE check list: 7 key evaluation criteria

The marriage of networking and security into the secure-access service edge stands to improve application performance, reduce infrastructure complexity, and protect sensitive data, and as such SASE is an attractive architecture for enterprises large and small. Due to the newness of SASE offerings, though, providers are still building and refining the features of their services, so available offerings are complex, often incomplete and require integration with customer organizations’ existing network and security architectures. Vendors of…

Read More

Leaky Server Exposes 12 Million Healthcare Records to Meow Attacker

Leaky Server Exposes 12 Million Healthcare Records to Meow Attacker

A healthcare technology company leaked 12 million records on patients including highly sensitive diagnoses, before the exposed cloud server was struck by the infamous “meow” attacker, researchers have revealed. A team at SafetyDetectives led by Anurag Sen discovered the leaky Elasticsearch server in late October after a routine IP address scan, although it’s unknown how long the data was exposed for before that. It was traced back to Vietnamese tech firm Innovative Solution for Healthcare…

Read More

Web Page Layout Can Trick Users into Divulging More Info

Web Page Layout Can Trick Users into Divulging More Info

Computer users can be manipulated into divulging more information than they would normally simply by the layout of webpages, new research has revealed. A team at Israel’s Ben-Gurion University of the Negev (BGU) presented its study, Online Disclosure Depends on How You Ask for Information, at the International Conference on Information Systems last week. They examined the behavior of 2504 users who were asked to provide their country, full name, phone number, and email address…

Read More
1 3,318 3,319 3,320 3,321 3,322 3,467