Here’s why your organization needs a security champions program

Here’s why your organization needs a security champions program

Here’s why your organization needs a security champions program | 2021-06-11 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Sunlight aims at more efficient virtualization

Sunlight aims at more efficient virtualization

Virtualization software is dated and does not take full advantage of modern hardware, making it extremely power-inefficient and forcing data centers to overprovision hardware to avoid poor performance. That’s the pitch of Sunlight, a virtualization-software vendor whose products take advantage of technologies that didn’t exist when Xen, KVM, VMware and Hyper-V were first developed. “The cloud infrastructure or virtualization stacks have been designed and built 15 to 20 years ago,” said Kosten Metreweli, chief strategy…

Read More

Crypto-mining campaign targets Kubeflow installs on a large scale

Crypto-mining campaign targets Kubeflow installs on a large scale

Microsoft uncovered a malicious campaign targeting Kubeflow workloads to deploy TensorFlow pods that are used to mine cryptocurrency. Microsoft researchers uncovered a malicious campaign targeting Kubeflow workloads to deploy TensorFlow pods that are used to mine for cryptocurrency. The campaign was first spotted at the end of May, experts noticed the deployment of TensorFlow pods at scale on multiple Kubernetes clusters. The pods ran legitimate TensorFlow images to mine cryptocurrency. Kubeflow allows deploying machine learning (ML)…

Read More

7 Steps to Improve Your Cloud Security Posture Management – VMware Cloud Community

7 Steps to Improve Your Cloud Security Posture Management – VMware Cloud Community

As enterprises continue to rapidly adopt cloud computing, cloud security remains a primary concern. According to Cybersecurity Insiders, 94% of cybersecurity professionals confirm they’re at least moderately concerned about public cloud security, with 69% of organizations rating their team’s security readiness as average or below average. To help address the gap in cloud security readiness, we’ve outlined seven key steps to help cloud customers improve their cloud security posture management. 1. Clarify internal cloud security…

Read More

Cisco upgrades intent-based-networking performance, security, analytics

Cisco upgrades intent-based-networking performance, security, analytics

Cisco brought new features to its DNA Center network-control platform that promise to improve performance, management analytics and security for its enterprise network customers. The new software features integration of a ThousandEyes agent that bulks-up the platform’s network-intelligence monitoring, a two-fold increase in the number of clients the system can support, and improved security and operational capabilities. DNA Center is the heart of Cisco’s intent-based networking strategy and is the vendor’s core-networking control platform supporting…

Read More

CISOs: It’s time to get back to security basics

CISOs: It’s time to get back to security basics

The post-pandemic world will see cybersecurity addressed differently, said panelists during an online webinar hosted by ReliaQuest Wednesday. Image: iStock/sdecoret The cyber threat landscape has become more dangerous over the past year and the C-suite is paying greater attention—but all the tools in the world won’t help until organizations home in on good cyber hygiene. That was one of the messages from CISOs who participated in a virtual think tank webinar hosted by ReliaQuest Wednesday….

Read More

IT Administrator Sentenced for Sabotaging Employer

IT Administrator Sentenced for Sabotaging Employer

Lockdown hasn’t ended for one vengeful IT professional who carried out a cyber-attack against his former employer.  Levi Delgado, of Middletown, Delaware, was sentenced on Wednesday to home confinement after hacking into a company’s computer network, deleting its data and disabling user accounts. The 36-year-old cyber-criminal had been employed as an information technology administrator at a medical center that provides care to under-served communities, but the medical center terminated Delgado’s employment in August 2017.  After losing his…

Read More

Arrest Made Over Multi-million-dollar BEC Scam

Arrest Made Over Multi-million-dollar BEC Scam

Texas law enforcement officers have made an arrest in connection with a multi-million-dollar wire fraud and money laundering scheme involving Business Email Compromise (BEC). Guillermo Perez was taken into custody Wednesday morning for allegedly defrauding businesses and individuals of more than $2m through cyber-scams and bank fraud schemes. An indictment unsealed on June 9 accuses 26-year-old Houston resident Perez of participating in the illegal scam from at least October 2018 to October 2019. Perez is accused of impersonating…

Read More

How to secure your WordPress login with 2FA

How to secure your WordPress login with 2FA

Jack Wallen shows you how to add two-factor authentication to your WordPress sites to avoid possible unwanted intrusion. Image: Jack Wallen Nothing is perfect. No matter what you do to lock down every account you have, you’re still at risk. However, doing nothing is akin to opening the metaphorical door and inviting trouble in. You don’t want that. Even though it might seem futile, you still want to enable every possible hurdle to make the…

Read More

Data Loss Prevention in Turbulent Times

Data Loss Prevention in Turbulent Times

By Otavio Freire, CTO & Co-Founder at SafeGuard Cyber Data, the saying goes, is the new oil. This probably understates the case: Not only is data at the core of the biggest businesses on earth but unlike oil, more and more of it is being created, at an exponential pace. Around 2.5 quintillion bytes of new data every day, to be precise. The most valuable forms of data exist within enterprises. Customer data, financial data,…

Read More
1 3,541 3,542 3,543 3,544 3,545 4,068