What are you missing when you don’t enable global threat alerts?

What are you missing when you don’t enable global threat alerts?

Network telemetry is a reservoir of data that, if tapped, can shed light on users’ behavioral patterns, weak spots in security, potentially malicious tools installed in enterprise environments, and even malware itself. Global threat alerts (formerly Cognitive Threat Analytics known as CTA) is great at taking an enterprise’s network telemetry and running it through a pipeline of state-of-the-art machine learning and graph algorithms. After processing the traffic data in batch in a matter of hours,…

Read More

Adam Selipsky returns to AWS as CEO. Now what?

Adam Selipsky returns to AWS as CEO. Now what?

It’s official: Tableau CEO Adam Selipsky is returning to AWS to take over as CEO when Andy Jassy takes the top job at Amazon later this year. This is a surprising outcome, as many observers expected an internal hire to be made to replace Jassy, with the likes of AWS sales and marketing chief Matt Garman or senior vice president Charlie Bell the frontrunners. Selipsky left AWS to take over as CEO of the analytics…

Read More

LogMeIn Appoints Michael Oberlaender as CISO

LogMeIn Appoints Michael Oberlaender as CISO

Cloud-based security provider LogMeIn has announced the appointment of Michael Oberlaender at its new chief information security officer (CISO). Oberlaender has been given responsibility for managing and growing the firm’s security program, both for internal systems and its portfolio of software products. This covers areas such as infrastructure, applications and overall data security. In this role, he will lead a global security team encompassing IT security, security operations, assurance, engagement, governance, risk management, compliance and…

Read More

Cisco IoT delivers double digit growth across industries – Cisco Blogs

Cisco IoT delivers double digit growth across industries – Cisco Blogs

If you’re like me, this last year has left me with an odd sense of time – where the 2020 lockdown seems both like yesterday and a decade ago. We all know how challenging it has been to balance work, life, families, and more. I’ve been fortunate to be in an industry that has made a real impact across all those vectors. We’re seeing IoT deliver increased business resiliency, better jobs, improved working conditions, increased…

Read More

Learn how agility has become the ultimate superpower for IT:

Learn how agility has become the ultimate superpower for IT:

Many CIOs and IT professionals are feeling between a rock and hard place right now, battling the disruption caused by the global pandemic while facing immense pressure to accelerate their digital journeys. Yet out of the crucible of these opposing forces, remarkable opportunities have emerged, along with new learnings and new innovations. I recently had the pleasure of moderating a roundtable discussion with the CIOs of three large customers. I also spoke with two of…

Read More

Forex Broker Leaks Millions of Customer Records Online

Forex Broker Leaks Millions of Customer Records Online

Over 20TB of sensitive customer data has been accidentally leaked online by a popular online trading broker, after it misconfigured a cloud database. Researchers at reviews site WizCase spotted the Elasticsearch server left wide open without any encryption or password protection. They quickly traced it back to FBS, one of the world’s busiest online brokers for foreign exchange (forex) trading, which boasts as many as 16 million global traders. According to the report, the database contained…

Read More

New Chinese Malware “CopperStealer” Thieving Credentials Saved by Browsers

New Chinese Malware “CopperStealer” Thieving Credentials Saved by Browsers

Cybersecurity researchers discovered a new malware making rounds online via fake software sites that targeted popular service providers like Facebook, Google, Instagram, Amazon, and Apple. The undocumented malware, dubbed CopperStealer, is a specially crafted credentials and cookies stealer with a downloader that installs additional malicious payloads on targeted browsers. Possible Links to Chinese Hackers According to an investigation from ProofPoint, CopperStealer operates similar to SilentFade malware, which is linked to Chinese hackers that targeted Facebook’s…

Read More

Small business cyber security: the ultimate guide – IT Governance UK Blog

Small business cyber security: the ultimate guide – IT Governance UK Blog

If you’re a small business owner, cyber security might seem impossibly complicated and filled with endless pitfalls. There’s indeed a lot at stake – with ineffective security measures potentially threatening your productivity, your bank accounts, and your employees’ and third parties’ personal data. But fortunately, the path to effective security needn’t be difficult. In this blog, we explain you need to know about cyber security for small businesses. Why cyber security presents unique risks for…

Read More

5 minutes with Jay Leaf-Clark – Getting started in cybersecurity

5 minutes with Jay Leaf-Clark – Getting started in cybersecurity

5 minutes with Jay Leaf-Clark – Getting started in cybersecurity | 2021-03-24 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

5 ways IT departments can build trust among their business partners

5 ways IT departments can build trust among their business partners

5 ways IT departments can build trust among their business partners | 2021-03-24 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More
1 3,540 3,541 3,542 3,543 3,544 3,873