Cancer Patients Diverted After Cyber-Attack on MedTech Firm

Cancer Patients Diverted After Cyber-Attack on MedTech Firm

Scores of US hospitals are thought to have been affected after a security breach at a specialist provider of equipment for cancer treatments last week. Swedish oncology and radiology system provider Elekta explained in a company update this week that a “data security incident” had affected its first-generation cloud-based storage system. “Immediately upon learning of this incident, Elekta partnered with leading cyber experts and law enforcement to launch an investigation to understand what happened, mitigate…

Read More

SASE is coming, but adoption will be slow (especially for large enterprises)

SASE is coming, but adoption will be slow (especially for large enterprises)

The adoption of edge computing and cloud infrastructure over the past decade combined with the recent surge in remote work, have seriously challenged traditional network architectures and security models. Large enterprises have been better able to adapt to this new reality, having access to larger IT budgets and skilled employees, but small and medium-sized businesses are struggling to keep up with the access control, monitoring and threat detection technologies needed to defend their local and…

Read More

First Horizon Bank Customers Have Account Funds Drained

First Horizon Bank Customers Have Account Funds Drained

A leading US bank has revealed a data breach in which over 100 online customers had their funds accessed by an unauthorized intruder. First Horizon Bank claimed in a filing with the Securities and Exchange Commission (SEC) yesterday that less than $1 million was stolen in total from those accounts. The attack itself seems to have relied on stolen or brute forced customer credentials, plus the exploitation of a vulnerability inside the financial services company….

Read More

Oracle Cloud VMware Solution – Networking Reference Architecture – VMware Cloud Community

Oracle Cloud VMware Solution – Networking Reference Architecture – VMware Cloud Community

I’ve been leading our technical sales and enablement initiatives for Oracle Cloud VMware Solution for some time now, and a number of the most common questions I hear are around how Oracle Cloud VMware Solution’s networking layers fit within the overall Oracle Cloud architecture. To try and answer those questions, I created this poster to visualize the logical topology design behind networking workflows across Customer On-Premises, Oracle Cloud VMware Solution, and Oracle Cloud Infrastructure.  My…

Read More

How Opentext minimized data risk during the pandemic

How Opentext minimized data risk during the pandemic

How Opentext minimized data risk during the pandemic | 2021-04-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Nominate the Most Influential People in Security

Nominate the Most Influential People in Security

Nominate the Most Influential People in Security | 2021-04-29 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Getting it Right – The Hidden Benefits of Compliance

Getting it Right – The Hidden Benefits of Compliance

If I were to ask you why you scanned for compliance at your company, I’d bet you’d tell me it was to help you pass requirements easier, to ensure that your audits are good on the first pass and so that you could troubleshoot technical issues with another process. You didn’t know about that last one? Wait, are you telling me you don’t know about the hidden benefits of compliance that you’re getting? Let’s talk….

Read More

Episode 2: You’re New to CIAM – Now What?

Episode 2: You’re New to CIAM – Now What?

So you’ve got a basic understanding of customer identity and access management (CIAM) and why it’s so important. Now it’s time to determine where you fall on Okta’s CIAM Maturity Curve and how to use that assessment to your advantage. In this second episode of our 5-episode podcast, The C-level Strategic Guide for CIAM Investment, we explore the first level on the CIAM Maturity Curve: basic. At this phase you’ve built critical identity security features…

Read More

802.1X: What you need to know about this LAN-authentication standard

802.1X: What you need to know about this LAN-authentication standard

When devics on enterprise LANs need to connect to other devices, they need a standard method for identifying each other to ensure they are communicating with the device they want to, and that’s what 802.1x does. This article tells where it came from and how it works. 802.1x defined IEEE 802.1X is a standard that defines how to provide authentication for devices that connect with other devices on local area networks (LANs). It provides a…

Read More

Red Hat announces Red Hat Edge initiative

Red Hat announces Red Hat Edge initiative

During this week’s Red Hat Summit, the company announced enhanced support for edge networking in its upcoming RHEL 8.4 release. The Red Hat Edge initiative promises new capabilities that will make RHEL a more powerful foundation for the open hybrid cloud. The Red Hat Edge aims to extend Red Hat’s open hybrid cloud portfolio to the edge. This will involve everything from telecommunications and transportation to smart automobiles and enterprise devices. With Red Hat technologies,…

Read More
1 3,490 3,491 3,492 3,493 3,494 3,910