Cybersecurity: Don’t blame employees—make them feel like part of the solution

Cybersecurity: Don’t blame employees—make them feel like part of the solution

Scientists find that blaming employees is counterproductive and suggest creating a safe environment for people to admit their mistakes and learn from them. One company already puts that into practice. Image: SvetaZi/Shutterstock Human error is not going away anytime soon, so we need to get past the blame game and figure out how to stop cyber bad guys. Thankfully, several behavioral scientists are working hard to accomplish this, including Amy C. Edmondson, the Novartis Professor…

Read More

Defending Cybersecurity Can’t Be Done Blindfolded–The EU’s NIS2 Review Can Set This Right | McAfee Blogs

Defending Cybersecurity Can’t Be Done Blindfolded–The EU’s NIS2 Review Can Set This Right | McAfee Blogs

Cybercriminals are currently enjoying a golden age, with the volume and severity of attacks growing constantly, and an ability to commit hostile acts with impunity. The EU, in its overhaul of cybersecurity laws dubbed NIS2, is committed to ensuring that what’s illegal offline should also be illegal online. For that to happen, cybersecurity researchers need to have access to all the tools possible to detect, trace and prevent crime online, including access to the Internet’s…

Read More

IBM moves toward consumption-based mainframe pricing

IBM moves toward consumption-based mainframe pricing

IBM continues to tweak its venerable mainframe to keep the Big Iron among the talking points in hybrid cloud. About a year ago the company changed its 20-year mainframe software pricing scheme to make it more palatable to hybrid cloud and multicloud users who might be thinking of moving workloads off the mainframe and into the cloud. Already IBM’s Tailored Fit Pricing for the IBM Z mainframe offers two consumption-based pricing models that can help…

Read More

Most of Exim email servers could be hacked by exploiting 21Nails flaws

Most of Exim email servers could be hacked by exploiting 21Nails flaws

The maintainers of the Exim email server software addressed a collection of 21 issues, dubbed 21Nails, that can allow attackers to fully compromise mail servers. The maintainers of the Exim email server software have released security updates to address a collection of 21 vulnerabilities, dubbed 21Nails, that can be exploited by attackers to take over servers and access email traffic through them. Exim is a free mail transfer agent (MTA) used on Unix-like operating systems,…

Read More

Your network is talking. Are you listening? 

Your network is talking. Are you listening? 

Your network. The enterprise, data center, campus, branch, and cloud. It is all yours. And you have to protect it. Well, not necessarily it (the physical), but all that it is on it (data, apps, workloads, etc.) Because we know two things; the digital transformation is real, and so are the threats that are getting into your network. Does this feel like a complex problem? It is, and you are not alone. Cisco Secure Network…

Read More

“Unusually Unhinged” Cyber-stalker Jailed for 10 Years

“Unusually Unhinged” Cyber-stalker Jailed for 10 Years

The United States has imprisoned a man who continued to cyber-stalk his ex-wife and kids after they moved states and changed their names to evade him. The determined Oscar Adrian Marquez tracked his former wife, Jennifer Lorraine, and two daughters from New Mexico to Oregon, harassing them even after they purchased guns and took out a protection order against him. Following a three-day trial in November 2020, 47-year-old Marquez was convicted of stalking, cyberstalking, and three counts of…

Read More

CaptureRx Data Breach Impacts Healthcare Providers

CaptureRx Data Breach Impacts Healthcare Providers

At least three American healthcare providers have suffered a data breach after a cyber-attack on an administrative services company in Texas. CaptureRx, which is based in San Antonio, fell victim to a ransomware attack on February 6. On February 19, an investigation into the attack determined that certain files had been accessed without authorization. During the attack, cyber-criminals exfiltrated files containing the personal health information (PHI) of more than 24,000 individuals. CaptureRx serves the Mohawk Valley Health…

Read More

How to integrate Linux Malware Detection and ClamAV for automated malware detection on Linux servers

How to integrate Linux Malware Detection and ClamAV for automated malware detection on Linux servers

Jack Wallen walks you through the steps of installing both Linux Malware Detection and ClamAV for a reliable one-two punch of malware and virus prevention. Image: Getty Images/iStockphoto Say that you’ve deployed Linux as your data center servers because of the reliability and security the open source platform offers. Don’t be fooled into thinking using Linux will be the be-all, end-all of your security needs. It’s always important to remember that, so long as it’s…

Read More

Android phones may be vulnerable to security flaw in Qualcomm chip

Android phones may be vulnerable to security flaw in Qualcomm chip

Patched on Qualcomm’s end, the flaw could allow attackers to access your call history and text messages and eavesdrop on your phone conversations, says Check Point Research. Android phone users may be susceptible to a security vulnerability that could compromise their devices. In a research report published Thursday, cyber threat intelligence provider Check Point Research revealed certain details on a flaw it identified in 2020 in Qualcomm mobile station modem (MSM) chips, including ones used…

Read More

DOD Expands Hacker Program

DOD Expands Hacker Program

The United States Department of Defense (DOD) has expanded its ethical hacking program to include more targets. DoD officials announced yesterday that the Department’s Vulnerability Disclosure Program will be broadened to include all publicly accessible DOD information systems. Bug hunters were first invited to engage with the DOD in 2016 when the initiative ‘Hack the Pentagon’ was launched. Through this initiative, the Defense Digital Service set up a bug bounty program to reward ethical hackers for identifying flaws…

Read More
1 3,472 3,473 3,474 3,475 3,476 3,911