Best practices in security leadership and management

Best practices in security leadership and management

Best practices in security leadership and management | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Conti ransomware is exploiting the log4shell vulnerability to the tune of millions

Conti ransomware is exploiting the log4shell vulnerability to the tune of millions

Log4Shell is a dangerous security concern — and now Conti, a prominent ransomware group, is exploiting it to attack vulnerable servers to extort millions of dollars. Image: Shutterstock/Khakimullin Aleksandr Log4Shell is the most severe vulnerability hitting systems in the end of 2021. Since its public exposure on the December 9, the security industry has worked hard to try to patch and protect against it. But sure enough, cybercriminals have started using it, and it was…

Read More

Helping Older Adults Build Strong Digital Literacy Skills

Helping Older Adults Build Strong Digital Literacy Skills

Most of us take our skills for granted when it comes to technology. We move effortlessly between applications and multiple devices. We install new software, set up numerous accounts, and easily clear technical hurdles that come our way. Unfortunately, that picture isn’t the norm for many older adults.   Engaging with technology can be challenging for older adults. However, when digital literacy skills are neglected or avoided, everyday activities such as online bill paying, shopping, medical appointments, and even social media can be overwhelming. And, since the pandemic, the digital divide between older adults and digital skills has…

Read More

9 Ways to Determine If Your Identity Has Been Stolen

9 Ways to Determine If Your Identity Has Been Stolen

Most of us use the internet every day, so we’re comfortable sharing a lot of information online. However, cybercriminals want us to get a bit too comfortable so they can take our personal or financial data and use it for their benefit. This is called identity theft, and it can cost people money and may dip their credit score. Fortunately, you can help minimize what happens by knowing the signs of identity theft and taking…

Read More

Tal Weitzman named CIO at Medecision

Tal Weitzman named CIO at Medecision

Tal Weitzman named CIO at Medecision | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Top 15 cybersecurity predictions for 2022

Top 15 cybersecurity predictions for 2022

Top 15 cybersecurity predictions for 2022 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Don’t let bad press about Open RAN sink your private 5G plans

Don’t let bad press about Open RAN sink your private 5G plans

Here’s a paradox for you. Why is a technology that’s supported at the planning level by 90% of the telcos, and by the majority of enterprises, getting a bunch of negative press? Why is something that’s both 5G and open not being applauded by all? I’m referring to the Open RAN model for 5G, of course, and the answer to all these “Why?” questions could say a lot about our industry and have a significant…

Read More

Ubisoft Reveals Player Data Breach Came from User Error

Ubisoft Reveals Player Data Breach Came from User Error

Ubisoft has admitted that data on some players may have been taken after a breach of its IT systems stemming from human error. The French gaming giant explained in a brief post that the misconfiguration of its IT infrastructure was quickly identified, but not before unauthorized individuals were able to access and perform a “possible copy” of the information. Data stolen related to players of the wildly popular Just Dance game. “The data in question…

Read More

Mastercard execs: Care and feeding of machine learning models is key to success

Mastercard execs: Care and feeding of machine learning models is key to success

With over 2.5 billion consumer accounts, Mastercard connects nearly every financial institution in the world and generates almost 75 billion transactions a year. As a result, the company has built over decades a data warehouse that holds “one of the best datasets about commerce really anywhere in the world,” says Ed McLaughlin, president of operations and technology at Mastercard.    And the company is putting that data to good use. The fastest growing part of…

Read More

CIOs spell out top tech priorities for 2022

CIOs spell out top tech priorities for 2022

CIOs seeking to impact their organizations in 2022 will double down on automation and actionable intelligence. They will also continue to lean heavily on the cloud and collaboration tools, two IT priorities that rose to prominence in navigating the pandemic for the past 21 months. That’s according to recent interviews with CIOs regarding their strategic priorities for the coming year, as well as a survey of 800 CIOs and C-suite executives from KPMG, which ranks…

Read More
1 3,383 3,384 3,385 3,386 3,387 4,363