Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

Next Generation Software Fills Some Gaps – But Agencies Still Need Accelerated Visibility and Control of Endpoints

By Boyd White, Director, Technical Account Management, Tanium Endpoint management is critical as agencies try to secure the knowns and unknowns in their IT environments. As cybercriminals become more sophisticated, IT teams need to not only mitigate known cyber breaches – but also need faster visibility and control when cybercriminals adapt their techniques. The recent threat of compromised software at SolarWinds is a good example of the quick pace in which agencies were forced to…

Read More

2021 Cybersecurity Outlook: The More Things Change, The More They Stay the Same

2021 Cybersecurity Outlook: The More Things Change, The More They Stay the Same

By Nir Gaist, Nyotron, Founder Cybersecurity has gone through many phases over the last few decades. Today, we hear about a new, more volatile-than-the-last attack every day that has the potential to disrupt business. These cyber-threats are hazardous to company structure and can lead to interruptions in production and loss of revenue. While these attacks may seem unavoidable, it is important to understand that a proper cybersecurity strategy, with the right defense mechanisms in place,…

Read More

DevNet Partners Turn it Up at Cisco Live Global 2021

DevNet Partners Turn it Up at Cisco Live Global 2021

As we approach Cisco Live Global 2021 (March 30 – April 1), the DevNet Partner community has much to celebrate. So, amp up and bring the noise for this year’s electrifying virtual event. If you’re a Cisco Partner and you’re building out your schedule, I encourage you to plug in “DevNet” into the search function and sign up for all our DevNet-focused sessions available with your free Explorer pass. Browse the catalog of sessions and…

Read More

Facebook Removes 16k Groups for Trading Fake Reviews

Facebook Removes 16k Groups for Trading Fake Reviews

Social media giant Facebook has removed thousands of groups from its platforms over the trading of fake and misleading reviews. The cull occurred after two separate interventions by Britain’s competition watchdog, the Competition and Markets Authority (CMA). In January 2020, Facebook committed to improving its identification, investigation, and removal of groups and other pages where misleading and fake reviews were being traded, and to preventing their return. Four months later, Facebook gave a similar pledge…

Read More

US Jails Cyber-stalker Who Targeted Attack Survivor

US Jails Cyber-stalker Who Targeted Attack Survivor

The United States has imprisoned the cyberstalker of a woman who, as a child, survived a violent assault that claimed the life of her friend.  According to court records, the victim was in a Texas bedroom with another girl in December 1999 when an assailant entered and slit both the little girls’ throats. The perpetrator was later caught and convicted of the crime. Alvin Willie George of Cross City, who has no connection to the…

Read More

LifeLabs Launches Vulnerability Disclosure Program

LifeLabs Launches Vulnerability Disclosure Program

Canada’s leading provider of laboratory diagnostic information and digital health connectivity systems today announced the launch of a new Vulnerability Disclosure Program (VDP). LifeLabs Medical Laboratory started the VDP program with the intention of strengthening cybercrime detection technology across its online tools, apps, and solutions. “Our goal is to continue to innovate and lead the health care industry in cybersecurity, offering the best protection and customer experience when accessing digital health records,” said LifeLabs CISO Mike…

Read More

Digital Transformation for a Major Retailer Takes a Co-Selling Team – Cisco Blogs

Digital Transformation for a Major Retailer Takes a Co-Selling Team – Cisco Blogs

Competition in the retail food space became even fiercer when Amazon bought Whole Foods, catapulting the digital giant into 450 physical locations across the United States. This move put all grocery store chains on notice: Digitally transform or perish. Easier said than done. Digital transformation essentially requires migrating workloads and applications to the cloud. But traditional brick-and-mortar grocers are unlikely to have all the expertise in house to go it alone. And no single vendor,…

Read More

Bring Your Broadband Network Gateways into the Cloud – Cisco Blogs

Bring Your Broadband Network Gateways into the Cloud – Cisco Blogs

With average fixed broadband speeds projected to peak up to 110+ Mbps and the number of devices connected to IP networks ballooning to 29+ billion (more than three times the global population by 2023), Internet growth remains unabated and could even be stronger as the ongoing pandemic makes the internet more critical than ever to our daily lives, defining a new normal for humanity – video conferences replaced physical meetings, virtual “happy hours” with coworkers…

Read More

New Cring ransomware deployed targeting unpatched Fortinet VPN devices

New Cring ransomware deployed targeting unpatched Fortinet VPN devices

Attackers are actively exploiting the CVE-2018-13379 flaw in Fortinet VPN to deploy the Cring ransomware to organizations in the industrial sector. Threat actors are actively exploiting the CVE-2018-13379 vulnerability in Fortinet VPNs to deploy a new piece of ransomware, tracked as Cring ransomware (also known as Crypt3r, Vjiszy1lo, Ghost, Phantom), to organizations in the industrial sector. The CVE-2018-13379 is a path traversal vulnerability in the FortiOS SSL VPN web portal that could be exploited by an unauthenticated attacker to download FortiOS system…

Read More

NCSC: Large Number of Brits Are Using Easily Guessable Passwords

NCSC: Large Number of Brits Are Using Easily Guessable Passwords

A substantial proportion of Brits choose passwords that are easy for cyber-criminals to predict, leaving them vulnerable to hacking. This is according to an independent survey carried out on behalf of the UK’s National Cyber Security Centre (NCSC). This found that when protecting their online accounts, people regularly use predictable passwords. These include pet names (15%), family members’ names (14%), a significant date (13%) and a favorite sports team (6%). Additionally, 6% of respondents admitted…

Read More
1 3,523 3,524 3,525 3,526 3,527 3,898