Take the Lunch Date. – Cisco Blogs

Take the Lunch Date. – Cisco Blogs

I could finally call myself a Cisconian, and yet I wasn’t sure what to expect. My manager, Carmen, set me up with a “lunch buddy” for my first day. Which, from an introvert’s perspective, is terrifying. What if this person was awkward? What if I’m awkward? What if we have nothing in common? I’d prefer to eat lunch by myself, thank you. But, sometimes, we introverts need that friendly push. I persevered and showed up…

Read More

FBI warns of OnePercent ransomware gang – what you need to know

FBI warns of OnePercent ransomware gang – what you need to know

What’s happened? The FBI has published a warning about a ransomware gang called the OnePercent Group, which has been attacking U.S. companies since November 2020. How are companies being attacked by the OnePercent gang? The gang emails targeted individuals inside an organization using social engineering tricks to dupe the unwary into opening a malicious Word document contained within an attached ZIP file. And the attachment encrypts data on the user’s PC? Not quite. Macros embedded…

Read More

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For – Cisco Blogs

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For – Cisco Blogs

Cybersecurity is a continuously evolving landscape. We constantly see new threats, and threat vectors, come and go; which puts a tremendous strain on the InfoSec teams that have to protect organizations and businesses from these threats. This year we saw the reemergence of old vectors: from ransomware & trojans, to supply chain attacks. At the same time companies saw security resources in their organizations dwindle, leaving defenders to cope up with the onslaught of attacks….

Read More

CIS Control 1: Inventory and Control of Enterprise Assets

CIS Control 1: Inventory and Control of Enterprise Assets

Since 2008, the CIS Controls have been through many iterations of refinement and improvement, leading up to what we are presented with today in CIS Controls version 8. CIS Controls reflect the combined knowledge of experts from every part of the ecosystem (companies, governments, and individuals). The controls reflect consideration by people in many different roles such as threat analysts, incident responders, solution providers, policy-makers, and more. This work is the wisdom collected from experts…

Read More

A closer look at two newly announced Intel chips

A closer look at two newly announced Intel chips

Our initial look at Intel’s Architecture Day focused on the new Xeons and IPU processors. Now we’ll get into the fine details, as well as look at other upcoming technologies. Sapphire Rapids Intel’s upcoming next-generation Xeon is codenamed Sapphire Rapids and promises a radical new design and gains in performance. One of its key differentiators is its modular SoC design. The chip has multiple tiles that appears to the system as a monolithic CPU and…

Read More

The compliance challenges of hybrid working – IT Governance UK Blog

The compliance challenges of hybrid working – IT Governance UK Blog

When employees were asked to work from home at the start of the COVID-19 pandemic, some people struggled to adapt. Isolated from colleagues and lacking the structure of office life, it felt like it would be a long, tiring wait until working life returned to normal. But in the year and a half since, we have come to accept that remote working is here to stay – although perhaps not quite as prescriptively as before….

Read More

“Sophisticated” Cyber-Attack Compromises Patient Data at Private Health Clinic

“Sophisticated” Cyber-Attack Compromises Patient Data at Private Health Clinic

Personal and clinical data of more than 73,000 patients have been affected by a “sophisticated ransomware cyber-attack” on a private medical clinic in Singapore. In a press release, Eye & Retina Surgeons revealed the attack took place on 6 August, compromising sensitive data including patients’ names, addresses, ID card numbers, contact details and clinical information. However, no credit card or bank account details were accessed or compromised in the incident. “Patients are now being progressively…

Read More

Government Names Candidate for New Information Commissioner

Government Names Candidate for New Information Commissioner

The UK government’s preferred candidate to be the next information commissioner will be John Edwards, who currently serves as New Zealand’s current privacy commissioner. The information commissioner plays an increasingly important role in the UK’s regulatory landscape following the country’s departure from the EU. The Information Commissioner’s Office (ICO) is an independent body that regulates the GDPR and its UK equivalent, the Data Protection Act 2018, as well as the Freedom of Information Act, the…

Read More

Record Summer for UK’s Cyber Skills Courses

Record Summer for UK’s Cyber Skills Courses

Over 1850 teenagers signed up for a government-backed cybersecurity skills initiative this summer, a record number, according to the National Cyber Security Centre (NCSC). The CyberFirst summer course is run by the GCHQ off-shoot and went online-only last year during the pandemic. That saw record participation which has been surpassed again in 2021, the NCSC claimed. The number of applications this year was also record-breaking, increasing from 3,909 in 2020 to 4,384. The course itself is open…

Read More

Tech Giants Commit Billions to Biden’s “Whole of Nation” Security Plan

Tech Giants Commit Billions to Biden’s “Whole of Nation” Security Plan

Some of the world’s biggest tech companies have committed tens of billions of dollars to improving supply chain security, closing industry skills gaps and driving security awareness among the public, according to the White House. As reported by Infosecurity yesterday, the Biden administration welcomed the CEOs of Microsoft, Apple, Google, IBM and others to a meeting yesterday to discuss the “whole-of-nation” effort needed to address cybersecurity threats.” The result of that encounter has been a…

Read More
1 3,466 3,467 3,468 3,469 3,470 4,154