December 2021: Cyber Deception Month

December 2021:  Cyber Deception Month

How Bad Are The Breaches? Please take the time to visit a visual mapping of the largest breaches… http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ Which I shortened for you… https://tinyurl.com/CDMG-DEC-2021  (you can trust me, I’m a CISSP and the Publisher of this Magazine in our 10th Anniversary) also… https://tinyurl.com/breaches2021  your choice.  Feel free to test these two URLs in VirusTotal but be warned, antivirus – even next gen AV cannot stop these breaches from happening. BILLIONS OF RECORDS, SO FAR……

Read More

The 3 Drivers of Zero Trust Network Access Implementation

The 3 Drivers of Zero Trust Network Access Implementation

It’s human nature to put off tasks that aren’t urgent. Whether it’s planning that never ends or simple procrastination, it’s easy to let timelines slip until an external force lights a fire under the project. At many organizations, that’s what’s happened with Zero Trust Network Access (ZTNA). The zero-trust security model has been around for a long time now and it’s well understood that it improves security because it forces ongoing verification of users and…

Read More

Ex Ubiquiti Developer Arrested for Data Theft

Ex Ubiquiti Developer Arrested for Data Theft

A man from Oregon has been charged with stealing confidential data from his employer and secretly extorting the company for a $2m ransom while purporting to be working on remediating the theft.  Portland resident Nickolas Sharp allegedly stole gigabytes of data from Ubiquiti Inc., a technology company headquartered in New York, where Sharp was employed from August 2018 to around April 1, 2021.  According to an indictment unsealed on Wednesday in Manhattan Federal Court, Sharp’s senior developer role gave…

Read More

Securely connecting the hybrid workforce and network edge: SD-WAN’s role in a SASE architecture – Cisco Blogs

Securely connecting the hybrid workforce and network edge: SD-WAN’s role in a SASE architecture – Cisco Blogs

Over the last 20 years of enterprise computing, we’ve seen big changes in work environments and IT setups. At the turn of the millennium, most employees worked at headquarters or in a branch office, and most software ran from on-site servers. Networks were designed with centralized architecture, with all traffic being routed through the corporate data center over MPLS or VPN. As a result, the entire security stack could be deployed on-premises in a single…

Read More

UK Government Fined Over Honors List Data Breach

UK Government Fined Over Honors List Data Breach

The UK’s data watchdog has slapped the British government with a hefty fine for exposing the addresses of individuals chosen to receive honors.  The Information Commissioner’s Office (ICO) said that the safety of hundreds of 2020 New Year Honors recipients had been placed in jeopardy after their personal data was published online. “On 27 December 2019 the Cabinet Office published a file on GOV.UK containing the names and unredacted addresses of more than 1,000 people announced in the New…

Read More

US Issues Cybersecurity Directive for Airlines and Railroads

US Issues Cybersecurity Directive for Airlines and Railroads

Nearly all railroads and airlines in the United States have been ordered to report cybersecurity breaches to the federal government.  Under the new Transportation Security Administration–issued mandate, rail operators, airport operators and airline operators will be required to report cybersecurity incidents to the Cybersecurity and Infrastructure Security Agency within 24 hours of detection. All three types of operators will also have to designate a cybersecurity coordinator. The mandate applies to both passenger and freight railroads….

Read More

Checkmate in One…Cisco Silicon One – Cisco Blogs

Checkmate in One…Cisco Silicon One – Cisco Blogs

The “second half of the chessboard” parable is a fitting metaphor for the industry to which I have dedicated my career. If you’re unfamiliar with the parable, here’s the gist of it: The game of chess was introduced to a king. The king was so delighted, he offered the inventor any reward she desired. The inventor asked for a single grain of rice to be placed on the first square of the chessboard and to…

Read More

How well do you know your APIs? Not well enough, says Cisco

How well do you know your APIs? Not well enough, says Cisco

Many APIs are openly accessible online, and that means big chunks of your apps are, too. Cisco’s Vijoy Pandey has tools and tips to help businesses get visibility into their APIs. Image: Shutterstock/Den Rise There’s a slight problem in the world of app development, and it’s one that’s pretty fundamental to the way modern software works: The disconnect between the necessity of application programming interfaces (APIs) and their horrible reputation as security black holes.  This…

Read More

John Edwards named CIO of WTS International

John Edwards named CIO of WTS International

John Edwards named CIO of WTS International | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Analyzing The Security Challenge of Hybrid and Remote Working Models

Analyzing The Security Challenge of Hybrid and Remote Working Models

By Mike East, VP EMEA, Menlo Security The pandemic has shifted the balance in many arenas, not least in relation to cybersecurity. Where COVID-19 has continued to have a drastic influence over economies, societies and governments globally, cybercriminals have been able to piggyback on a perfect storm of uncertainty and confusion, tapping into fears and capitalizing on new vulnerabilities. One of the most significant indirect impacts of the pandemic has been the uptick in remote…

Read More
1 3,420 3,421 3,422 3,423 3,424 4,350