Cybersecurity pros: Are humans really the weakest link?

Cybersecurity pros: Are humans really the weakest link?

Some experts argue that users might actually be the most vital link when it comes to certain types of cyberattacks. Image: iStockphoto/maxkabakov “People often represent the weakest link in the security chain and are chronically responsible for the failure of security systems.” This quote is from the book Secrets and Lies: Digital Security in a Networked World, written by well-known cybersecurity expert Bruce Schneier and first published in 2000.  Some experts, including Ciarán Mc Mahon,…

Read More

Russia Officially Denies Large-scale US Hack

Russia Officially Denies Large-scale US Hack

Russia has officially denied any culpability for a recent cyber-attack that impacted at least six federal agencies in the United States. America’s Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive last week after cyber-criminals trojanized updates to SolarWinds’ Orion IT monitoring and management software to launch a large-scale cyber-attack.  CISA said that the incident poses “unacceptable risk to the security of federal networks” and urged all federal civilian agencies to review their networks for indicators of compromise…

Read More

Anomali Threat Research Warns Consumers: Don’t Use Bitcoin to Buy “Hatched” German Shepherds This Holiday Season

Anomali Threat Research Warns Consumers: Don’t Use Bitcoin to Buy “Hatched” German Shepherds This Holiday Season

In early December 2020, Anomali Threat Research identified a website engaging in fraudulent dog sales, specifically for German Shepherds. The analysis revealed 17 additional websites also engaging in pet fraud activities for birds and cats, as well as one phone number match for a Facebook page car fraud scheme, and one number for an essential oils scam. The actor(s) behind this campaign are not sophisticated, and aim to receive non-refundable deposits for fraudulent pet sales…

Read More

Finally, True Unified Multi-Vector Data Protection in a Cloud World | McAfee Blogs

Finally, True Unified Multi-Vector Data Protection in a Cloud World | McAfee Blogs

This week, we announced the latest release of MVISION Unified Cloud Edge, which included a number of great data protection enhancements. With working patterns and data workflows dramatically changed in 2020, this release couldn’t be more timely. According to a report by Gartner earlier in 2020, 88% of organizations have encouraged or required employees to work from home. And a report from PwC found that, corporations have termed the remote work effort in 2020, by…

Read More

Deloitte: 5G to drive edge, open RAN to the forefront in 2021

Deloitte: 5G to drive edge, open RAN to the forefront in 2021

Edge computing is flagged as a key networking technology for 2021 as well as open radio-access framework, both of which are fundamentally driven forward by mobile data carriers and their rush to deploy 5G, according to Deloitte. The Edge Edge computing, including compute workloads being handled on or close to endpoints deployed outside the data center, will be among the biggest technological growth areas in 2021. Deloitte predicts that the global market for edge products…

Read More

10 Innovations from WebexOne That Change the Game for Partners & Customers – Cisco Blogs

10 Innovations from WebexOne That Change the Game for Partners & Customers – Cisco Blogs

On December 8-9th, we hosted WebexOne, Cisco’s premier digital collaboration event where our partners and customers came together to explore the power and impact of collaboration.  At Cisco, we are proud of the work the Webex team has done this past year to ensure nearly 600 million users (MAU as of Oct 2020) were able to stay connected and productive; in addition to that, we connected over 1.2 billion phone calls every month for our…

Read More

BlueHalo Acquires Base2 and Fortego

BlueHalo Acquires Base2 and Fortego

Arlington Capital Partners portfolio company BlueHalo today announced that it has completed the acquisition of Maryland businesses Base2 LLC and Fortego LLC. While both companies are leading providers of complex, mission-critical cyber and Signals Intelligence (SIGINT) solutions, Base2 specializes in the design and development of cyber-solutions in the areas of Computer Network Operations (CNO), SIGINT, and Quick Reaction Capability (QRC). “We reached a point where it was time to consider being part of a larger organization that could help our company grow long term,”…

Read More

Top 5 tech skills to master in 2021

Top 5 tech skills to master in 2021

If you want to improve or expand your current skill set, there are a few options you can focus on. Tom Merritt lists five tech skills to master in the coming year. Looking for an IT job in 2021? Want to make sure you stay up to speed in the job you have? It’s good to know which skills will give you the best chance at landing or keeping that position you want. TechRepublic’s Veronica…

Read More

Continue Clean-up of Compromised SolarWinds Software

Continue Clean-up of Compromised SolarWinds Software

Last week, the United States Cybersecurity & Infrastructure Security Agency (CISA) advised on initial steps to take in response to the SolarWinds software that was compromised by advanced persistent threat actors. While federal agencies were under a deadline to complete certain actions, this issue will require continued clean-up and longer-term efforts to mitigate the threat. Staying the course, organizations will want to scan their environments for the presence of the compromised SolarWinds software. There may…

Read More
1 3,322 3,323 3,324 3,325 3,326 3,467