Retail Sector Takes Additional Precautions Ahead of the 2020 Holidays

Retail Sector Takes Additional Precautions Ahead of the 2020 Holidays

Coronavirus 2019 (COVID-19) stopped many things in 2020. While in-store holiday shopping may be greatly reduced for some, there’s still a lot of shopping happening online. Near the end of November 2020, Statista revealed that holiday retail sales were expected to grow approximately 3.6% over the previous year. And Adobe Analytics reported that online sales would likely rise 33% to a record $189 billion. CNBC clarified that this number condenses two years’ worth of economic…

Read More

9 best practices to achieve effective cloud security

9 best practices to achieve effective cloud security

9 best practices to achieve effective cloud security | 2020-12-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

It’s time to modernize the voting process

It’s time to modernize the voting process

It’s time to modernize the voting process | 2020-12-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Adapting your security operations to the remote work environment

Adapting your security operations to the remote work environment

Adapting your security operations to the remote work environment | 2020-12-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Two factor authentication: Two steps forward, one step back

Two factor authentication: Two steps forward, one step back

Two factor authentication: Two steps forward, one step back | 2020-12-15 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Self Care – Lessons from Teaching Cybersecurity: Week 11

Self Care – Lessons from Teaching Cybersecurity: Week 11

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python course aimed at high school students that I’m teaching…

Read More

Strike a balance: Ensuring secure remote work without hindering productivity

Strike a balance: Ensuring secure remote work without hindering productivity

Remote work will be a permanent scenario for many organizations, according to the CIO Pandemic Business Impact Survey 2020. This underscores the need for policies that secure remote data access without inhibiting user productivity. “Given the paradigm shift to remote work, companies must protect their IT infrastructure — including networks, application servers, and VPN access points — against distributed denial-of-service attacks comprehensively on all levels and across all platforms,” says Mark Wilczek (@MarcWilczek), COO at…

Read More

5 building blocks of a well-developed security culture

5 building blocks of a well-developed security culture

A defined security culture is helping the financial industry, though the fundamentals should apply to any business. Image: Getty Images/iStockphoto I remember watching a bank being built. After the concrete foundation and ground floor were in place, workers began building a massive concrete and steel box right in the middle of the building’s floor. It finally dawned on me: That was the vault. It seemed impenetrable.  Financial institutions are hypervigilant when it comes to security….

Read More

Threat Advisory: SolarWinds supply chain attack – Cisco Blogs

Threat Advisory: SolarWinds supply chain attack – Cisco Blogs

Cisco Blogs / Security / Threat Research / Threat Advisory: SolarWinds supply chain attack Cisco Talos is monitoring yesterday’s announcements by FireEye and Microsoft that a likely state-sponsored actor compromised potentially thousands of high-value government and private organizations around the world via the SolarWinds Orion product. FireEye reported on Dec. 8 that it had been compromised in a sophisticated attack in which state-sponsored actors stole sensitive red team tools. Upon investigating the breach further, FireEye…

Read More

EDR. NDR? XDR! … is it more than just marketing? – Cisco Blogs

EDR. NDR? XDR! … is it more than just marketing? – Cisco Blogs

As is often true with new security concepts, vendors are quickly adopting the new terminology to showcase their products’ capabilities. This is where things get confusing and tricky. Some vendors are using XDR (Extended Detection & Response) as a marketing strategy for their existing EDR (Endpoint Detection & Response) or NDR (Network Detection & Response) products, others are launching new products or just rebranding existing products explicitly as “XDR”. Some vendors have built both EDR…

Read More
1 3,335 3,336 3,337 3,338 3,339 3,462