4 Cybersecurity Best Practices for Edge Computing

4 Cybersecurity Best Practices for Edge Computing

Incidents of cyber-attacks against IT networks are intensifying globally. The recent spate of ransomware attacks on the American oil pipeline system and the global meat supply chain highlights both the vulnerabilities that exist in our IT infrastructure, as well as the devastating impact these cyber breaches can have even when that breach might seem relatively innocuous.  In the case of the Colonial Pipeline hack, the attack reportedly only reached the front-end business IT systems, not…

Read More

The Cybersecurity and Geopolitical Podcast— Morality and Cyber Risk, Role of a CISO, and Governmental Anti-Cybercrime — Episode 7

The Cybersecurity and Geopolitical Podcast— Morality and Cyber Risk, Role of a CISO, and Governmental Anti-Cybercrime — Episode 7

The Cybersecurity and Geopolitical Podcast— Morality and Cyber Risk, Role of a CISO, and Governmental Anti-Cybercrime — Episode 7 This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

Facebook to Shield Public Figures from Cyber-harassment

Facebook to Shield Public Figures from Cyber-harassment

Social media company Facebook has announced plans to selectively protect some of its better-known users from being harassed on its platform. Updates to the company’s bullying and harassment policies were announced yesterday by Facebook’s global head of safety, Antigone Davis. The announcement coincided with National Bullying Prevention and Awareness Day in the United States.  Davis said Facebook is introducing a policy “to help protect people from mass harassment and intimidation.” Under the new rules, “harmful content” that attacks public…

Read More

How a vishing attack spoofed Microsoft to try to gain remote access

How a vishing attack spoofed Microsoft to try to gain remote access

A voice phishing campaign spotted by Armorblox tried to convince people to give the attackers access to their computer. Image: Tero Vesalainen, Getty Images/iStockphoto A standard phishing attack typically involves sending people an email or text message spoofing a known company, brand or product in an attempt to install malware or steal sensitive information. But a variation called vishing (voice phishing) adds another element, in which the cybercriminals speak with their victims directly by phone…

Read More

Software engineers and developers among most in-demand cybersecurity roles

Software engineers and developers among most in-demand cybersecurity roles

Software engineers and developers among most in-demand cybersecurity roles This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Broadcom Software’s Symantec Threat Hunter Team discovers first-of-its-kind ransomware

Broadcom Software’s Symantec Threat Hunter Team discovers first-of-its-kind ransomware

The new ransomware family, called Yanluowang, appears to still be under development and lacks some sophisticated features found in similar code. Nonetheless, Symantec said, it’s dangerous. kaptnali, Getty Images/iStockphoto The Symantec Threat Hunter Team at Broadcom Software has discovered what appears to be a brand new family of ransomware named after the Chinese deity that judges the souls of the dead. Yanluowang is the perfect ransomware for the Halloween season, though this particular malevolent digital…

Read More

Acer Confirms Second Security Breach

Acer Confirms Second Security Breach

Another cybersecurity breach has occurred at Taiwanese computer manufacturer Acer. Earlier this year, the company suffered a $50m ransomware extortion attempt after falling prey to the REvil ransomware group in May. In this latest incident, the computer maker initiated its security protocols after detecting an attack on the section of its after-sales service system that is based in India.  Prior to Acer’s confirmation of the breach, hackers claimed to have stolen more than 60 GB of the company’s data. On…

Read More

China Personal Information Protection Law (PIPL): A New Take on GDPR?

China Personal Information Protection Law (PIPL): A New Take on GDPR?

Many people have heard of the GDPR (General Data Protection Regulation), legislation that became law across the EU in May 2018.  It was designed to regulate how businesses protect personal data, notably how personal data is processed, and granted rights to individuals to exercise more control over their personal data. GDPR is a framework which requires businesses to implement processes to enable them to understand where data is held, how it is used, how long…

Read More

Replicating Encrypted S3 Objects Across AWS Accounts – VMware Cloud

Replicating Encrypted S3 Objects Across AWS Accounts – VMware Cloud

Having multiple AWS accounts within an organization is a common strategy. Numerous factors play a crucial role in deciding the appropriate number of AWS accounts required for an organization, such as resource isolation, security isolation, cost allocation, billing, business unit separation, audit, compliance, etc. However, managing multiple AWS accounts also comes with some additional complexity.  Usually, data stored in S3 is replicated primarily for reliability, performance, and compliance reasons. How can we replicate objects to a bucket owned by a different AWS account? What if…

Read More

Biometric authentication sees increase in adoption during the pandemic

Biometric authentication sees increase in adoption during the pandemic

Biometric authentication sees increase during the pandemic This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More
1 3,430 3,431 3,432 3,433 3,434 4,237