Molson Coors Suffers Suspected Ransomware Attack

Molson Coors Suffers Suspected Ransomware Attack

Beverage giant Molson Coors has released details of what appears to be a ransomware incident. The firm, known for big-name brands such as Coors, Miller Lite and Foster’s, revealed the attack in a filing with the Securities and Exchange Commission (SEC) yesterday. It claimed the firm had experienced a “systems outage caused by a cybersecurity incident” which it was in the process of managing. “The company has engaged leading forensic information technology firms and legal…

Read More

“Hacker Games” Launched to Encourage Development of Secure Coding Skills

“Hacker Games” Launched to Encourage Development of Secure Coding Skills

App security testing firm Veracode has launched its inaugural Veracode Hacker Games, an event which aims to encourage the growth of secure coding skills. Taking place over two weeks from March 15-25 2021, computer science and cybersecurity teams from eight leading universities in the UK and US will be tested on their secure coding skills in a collegiate contest. A number of individual prizes will be on offer and Veracode will donate $10,000 and $5000 for…

Read More

Key considerations for contact tracing applications

Key considerations for contact tracing applications

Key considerations for contact tracing applications | 2021-03-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The exposure in traditional executive protection

The exposure in traditional executive protection

The exposure in traditional executive protection | 2021-03-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Celebrating how we have all RISEN above all challenges – Cisco Blogs

Celebrating how we have all RISEN above all challenges – Cisco Blogs

For us, at Cisco, diversity and inclusion is a huge part of our culture, and for International Women’s Day this year, we want to align and focus on three key themes that we believe everyone can resonate with: RISE, Shine and Thrive. For today, I would like to elaborate on the RISE portion. Over the past year, everyone around the world has had to RISE to the occasion and adapt to a new normal; we…

Read More

Top enterprise data center trends you need to know

Top enterprise data center trends you need to know

Data-center networking was already changing prior to the technology challenges brought on by the COVID-19 pandemic, and few areas of the enterprise will continue to be affected more than data centers by those modifications in the future. That’s because myriad technologies are driving changes in the data center—everything from heavy demand for higher-speed networking, support for a remote workforce, increased security, tighter management and perhaps the biggest alteration—the prolific growth of cloud services. Cloud is key…

Read More

Zero Trust Network Access: The Evolution of VPN

Zero Trust Network Access: The Evolution of VPN

The recent rise in remote working has put a spotlight on the limitations of virtual private networks (VPNs). For years, VPNs have been the de facto method of accessing corporate networks, but they have some drawbacks in light of today’s more complex ecosystems. The biggest issue for complex network deployments is that a VPN takes a perimeter-based approach to security. Users connect through the VPN client, but once they’re inside the perimeter, and in the…

Read More

How to install and configure 2FA on AlmaLinux

How to install and configure 2FA on AlmaLinux

Jack Wallen walks you through the process of enabling two-factor authentication on the new fork of CentOS, AlmaLinux. Image: iStock/natasaadzic In light of the CentOS kerfuffle (check out: Clearing up the CentOS Stream confusion), you might have opted to migrate your Linux servers to the new fork, AlmaLinux. If that’s the case, you’ve either found the process to be incredibly automatic or a bit of a challenge. Once you have AlmaLinux up and running, one…

Read More

USGA Partners with Webex to Keep the Ball Rolling

USGA Partners with Webex to Keep the Ball Rolling

The Customer Story blog series highlights how Cisco’s collaboration technology has helped customers solve their business challenges. Learn how Cisco is meeting customers where they are helping them achieve their business goals. Case Study: Cisco Webex Collaboration Platform and Devices Connect Players and Fans The U.S. Open and U.S. Women’s Open are two of the biggest golf tournaments in the world. Typically tens of thousands of fans come onsite to watch and be part of…

Read More

School Boss Resigns After Porn Found on Computer

School Boss Resigns After Porn Found on Computer

An Arizona county school superintendent has resigned following the discovery of pornographic material on his work-issued computer, according to records obtained by The Associated Press. Coconino County announced the resignation of 67-year-old Tommy Lewis Jr. at the end of January 2021. At the time, the county said that Lewis was stepping down for personal reasons.  However, when questioned by the AP, a county spokesperson later confirmed that Lewis was under investigation for potential criminal activity. Lewis’ proclivity…

Read More
1 3,559 3,560 3,561 3,562 3,563 3,862