Four steps to bolster e-commerce software security this holiday season

Four steps to bolster e-commerce software security this holiday season

Four steps to bolster e-commerce software security this holiday season | 2020-12-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

How to protect your ecommerce data from disaster in 2021

How to protect your ecommerce data from disaster in 2021

How to protect your ecommerce data from disaster in 2021 | 2020-12-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Attacker dwell time: Ransomware’s most important metric

Attacker dwell time: Ransomware’s most important metric

Attacker dwell time: Ransomware’s most important metric | 2020-12-14 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

8 Key Insights from the 2020 (ISC)2 Cybersecurity Workforce Study

8 Key Insights from the 2020 (ISC)2 Cybersecurity Workforce Study

2020 has been a very interesting year for the global workforce, with the vast majority of organizations having to rapidly transition to a remote workforce with little to no prior notice thanks to the COVID-19 pandemic. The 2020 (ISC)2 Cybersecurity Workforce Study looks at the effect of this transition to remote work and how organizations have fared. It also analyzes the impact of the pandemic and the resultant transition to remote work on cybersecurity professionals….

Read More

Cloud Security Best Practices: Messy Blobs and Leaky Buckets

Cloud Security Best Practices: Messy Blobs and Leaky Buckets

Moving to the cloud means a lot more than just moving your servers and applications to the cloud; it’s also about the data – and data always has a target on it. A lot of IT departments are finding that it’s easier to meet the “five nines” (99.999%) of uptime and availability by going outside their organization and letting AWS, Microsoft, or Google handle the infrastructure and personnel needed to meet those requirements. Plus, if your…

Read More

Telegram for Business Communications: Understanding The Risks And Rewards – Cyber Defense Magazine

Telegram for Business Communications: Understanding The Risks And Rewards – Cyber Defense Magazine

By Otavio Freire, CTO and Co-Founder, SafeGuard Cyber During a virtual panel discussion at the European Central Bank’s Forum on Central Banking in November, Federal Reserve Chair Jerome Powell noted the pandemic’s economic effect was to accelerate existing trends, including the increasing use of technology and automation. “We’re recovering,” he said, “but to a different economy.” Indeed, the adoption of cloud-based apps that maximize flexibility and minimize friction in business communication is just such a…

Read More

Cybersecurity: Innovation Needed – Cyber Defense Magazine

Cybersecurity: Innovation Needed – Cyber Defense Magazine

Managing Complexity and Consistency, and Giving Users the Simplification, Automation, and Security They Want. By Laurence Pitt, Global Security Strategy Director, Juniper Networks Innovation is at the heart of cybersecurity – both because cybersecurity professionals are inherently curious by nature and because threat actors are continually innovating and evolving their attack approaches and the exploits themselves. Nonetheless, the last several months have demonstrated the need for change and new directions of innovation. A recent presentation…

Read More

Security moves from blocker to driver of open source adoption

Security moves from blocker to driver of open source adoption

Commentary: Companies used to look to open source to lower costs. That’s still true, but an even bigger driver is security, according to a new developer survey. Image: iStock/natasaadzic Companies have long turned to open source to save money. Surveys over the years have captured customer intent to lower costs through open source; analyst firms have called it out, too. Similar surveys and/or analyses historically identified common inhibitors to adoption, including support and security.  And…

Read More

Threat Roundup for December 4 to December 11 – Cisco Blogs

Threat Roundup for December 4 to December 11 – Cisco Blogs

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between December 4 and December 11. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats. As a reminder, the information provided for the following threats in this post is non-exhaustive…

Read More

US Frees ISIL Cyber-Operative

US Frees ISIL Cyber-Operative

A Kosovan hacker, imprisoned in the United States for stealing personal data belonging to US military and government personnel and sending it to the Islamic State of Iraq and the Levant (ISIL), has been granted compassionate release. Ardit Ferizi was sentenced to 20 years in prison in September 2016 after he confessed to providing material support to a designated foreign terrorist organization and to accessing a protected computer without authorization. Ferizi’s case made headlines for being the first-ever…

Read More
1 3,338 3,339 3,340 3,341 3,342 3,461