How to right-size edge storage

How to right-size edge storage

Edge computing is shaping up as the most practical way to manage the growing volume of data being generated by remote sources such as IoT and 5G devices. A key benefit of edge computing is that it provides greater computation, network access, and storage capabilities closer to the source of the data, allowing organizations  to reduce latency. As a result, enterprise are embracing the model: Gartner estimates that 50% of enterprise data will be generated…

Read More

US to Ban Export of Hacking Tools to Authoritarian States

US to Ban Export of Hacking Tools to Authoritarian States

The US government has issued new rules designed to prevent the export of hacking and surveillance tools to regimes guilty of human rights abuses. The “interim final rule” was released by the Commerce Department’s Bureau of Industry and Security (BIS) and will go into force in 90 days, Governments singled out by the proposals are “of concern for national security reasons” or subject to an arms embargo. Restrictions will also apply if the exporter knows that the…

Read More

Data Scrapers Expose 2.6 Million Instagram and TikTok Users

Data Scrapers Expose 2.6 Million Instagram and TikTok Users

Security researchers have discovered over two million social media user profiles scraped from the internet after they were unwittingly exposed online by an analytics firm, Infosecurity can reveal. A team at reviews site SafetyDetectives led by Anurag Sen found the data located on a misconfigured Elasticsearch server, left exposed without any password protection or encryption in place. It quickly traced the 3.6GB trove of more than 2.6 million TikTok and Instagram profiles to IGBlade, a firm that provides marketing insights…

Read More

Professional diversity within security

Professional diversity within security

Professional diversity within security This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message or continuing…

Read More

Does your communication platform guarantee data security – and data privacy?

Does your communication platform guarantee data security –  and data privacy?

Does your communication platform guarantee data security – and data privacy? This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

CIS Control 09: Email and Web Browser Protections | The State of Security

CIS Control 09: Email and Web Browser Protections | The State of Security

Web browsers and email clients are used to interact with external and internal assets. Both applications can be used as a point of entry within an organization. Users of these applications can be manipulated using social engineering attacks. A successful social engineering attack needs to convince users to interact with malicious content. A successful attack could give an attacker an entry point within an organization. CIS Control 9 provides several safeguards to ensure safety of…

Read More

Critical National Infrastructure (CNI) Attacks on the Rise: Are We Ready?

Critical National Infrastructure (CNI) Attacks on the Rise: Are We Ready?

When we think about cyberattacks and malicious hackers, we often think in terms of our own personal lives and our own organizations. In my experience in cybersecurity, I often hear people say “Why would hackers target me? We are too small” or “I’ve never been affected by a cyberattack, so it’s not really something I’m interested in.” The reality is that cybercriminals may be targeting you not because of your size but because of who…

Read More

Gartner says IT spending to top $4 Trillion in 2022

Gartner says IT spending to top  Trillion in 2022

With IT budgets growing at the fastest rate in 10 years, worldwide IT spending is projected to total $4.5 trillion in 2022, an increase of 5.5% from 2021, according to the latest Gartner forecasts. All IT spending segments—from data-center systems to communications services—are forecast to grow next year, according to Gartner.  Enterprise software is likely to have the highest growth in 2022 at 11.5%, driven by infrastructure software spending. Global spending on devices grew over 15% …

Read More

MTU size issues, fragmentation, and jumbo frames

MTU size issues, fragmentation, and jumbo frames

The maximum transmission unit (MTU) is the largest number of bytes an individual datagram can have without either being fragmented into smaller datagrams or being dropped along the path between its source and its destination. For Ethernet frames—and many other types of packets—that number is 1500 bytes, and it generally meets the requirements of traffic that can cross the public internet intact. So, if 2000-byte Ethernet packets arrive at a router, it will split their…

Read More

Russian Cyber-criminals Switch to Cloud

Russian Cyber-criminals Switch to Cloud

Cybersecurity firm Kaspersky today released research on Russian-speaking cyber-criminal activity and how it has changed over the past six years. The study by Kaspersky’s Computer Incident Investigation Department found that historically favored attacks targeting banks and other financial organizations with money-stealing malware have largely been replaced. Nowadays, cyber-criminals prefer to hit their targets with ransomware and data-stealing attacks delivered via spear-phishing emails with malicious attachments. “Back in 2016, our primary focus was on big cyber-gangs that targeted financial institutions,…

Read More
1 3,419 3,420 3,421 3,422 3,423 4,240