6 ways to enhance defenses against cyberattacks

6 ways to enhance defenses against cyberattacks

6 ways to enhance defenses against cyberattacks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

CIS Control 11: Data Recovery | The State of Security

CIS Control 11: Data Recovery | The State of Security

Data loss can be a consequence of a variety of factors from malicious ransomware to hardware failures and even natural disasters. Regardless of the reason for data loss, we need to be able to restore our data. A data recovery plan begins with prioritizing our data, protecting it while it is being stored, and having a plan to recover data.    Key Takeaways for Control 11 Prioritize your data and come up with a data…

Read More

Red Hat Enterprise Linux 9 drops in beta version

Red Hat Enterprise Linux 9 drops in beta version

Red Hat Enterprise Linux version 9 released today as a beta, bringing about a dozen major new features focused on security and compliance, simplified management and automation. But the biggest news might be the lack of changes to the management and administration tools from the previous version, which could make adoption fairly painless. The key new management features include enhanced web-console performance metrics for easier diagnosis of problems, live kernel patching without the need for…

Read More

Realizing the Edge Benefits with Remote Monitoring

Realizing the Edge Benefits with Remote Monitoring

Managing the resources that comprise today’s edge computing ecosystems is complicated and challenging. Yet, it’s a critical task, as automation, the Internet of Things, and cloud computing take their place in today’s hybrid IT infrastructure in every major industry. Take financial services. Branch offices are deploying mini data centers to get vital information and services closer to customers. Or retailers, who are finding increased computing power in the store crucial for providing better customer experiences….

Read More

Cyber-Incident Impacts UK Labour Party

Cyber-Incident Impacts UK Labour Party

A company that handles the membership data of Britain’s Labour Party has been affected by a “cyber-incident.” Labour said that the event at the third-party firm has rendered “a significant quantity” of party data “inaccessible on their systems.” The incident has been reported to the UK’s National Cyber Security Centre (NCSC), National Crime Agency (NCA), and the Information Commissioner’s Office (ICO), which are investigating what transpired.  Data impacted by the incident includes information provided to…

Read More

Cisco NaaS study: IT pros are interested but wary

Cisco NaaS study: IT pros are interested but wary

As IT pros evaluate the role of network-as-a-service, they weigh the upsides of quicker access to new technologies and faster incident-response times against loss of control over security and potential disruptions caused by transitioning away from traditional networking, according to a new Cisco report. These are among the results from Cisco’s survey of 1,534 IT professionals in 13 countries as well as interviews with 20 IT leaders that are compiled in the company’s “2022 Global…

Read More

Cisco Talos reports new variant of Babuk ransomware targeting Exchange servers

Cisco Talos reports new variant of Babuk ransomware targeting Exchange servers

A new bad actor called Tortilla is running the campaign, and most affected users are in the U.S. Cisco Talos recently discovered a malicious campaign deploying variants of the Babuk ransomware via an unusual infection chain technique. Image: Cicso Talos Cisco Talos has a warning out for U.S. companies about a new variant of the Babuk ransomware. The security researchers discovered the campaign in mid-October and think that the variant has been active since July…

Read More

US House Passes Acts to Help SMBs with Cybersecurity

US House Passes Acts to Help SMBs with Cybersecurity

The United States House of Representatives has passed two bills to strengthen the cybersecurity of small businesses.  The Small Business Development Center Cyber Training Act of 2021 attracted strong support among House members of all political persuasions and was passed on Tuesday with a vote of 409 in favor to 14 against.  Representative Andrew Garbarino, who is both a member of the Small Business Committee and a ranking member of the Committee on Homeland Security’s Subcommittee on…

Read More

Data and the policies that protect it: 4 essential plans to have in place

Data and the policies that protect it: 4 essential plans to have in place

These four sample policies can help you protect your data by ensuring it’s properly encrypted, stored safely, only accessible by certain people, and securely backed up. Image: Andriy Onufriyenko / Getty Images It’s been said we’ve gone beyond the information age and into the experience age, imagination age, fourth industrial revolution or one of a dozen other names for our current technological era. It doesn’t matter what we call it, the underpinning of it all…

Read More

Trojan Source attack method allows hiding flaws in source code

Trojan Source attack method allows hiding flaws in source code

Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by a group of Cambridge researchers that can allow threat actors to hide vulnerabilities in the source code of a software project. The technique could be exploited to inject stealth malware without impacting the semantics of the source code while changing its logic. “We present a…

Read More
1 3,394 3,395 3,396 3,397 3,398 4,249