Detecting and Responding to SolarWinds Infrastructure Attack with Cisco Secure Analytics

Detecting and Responding to SolarWinds Infrastructure Attack with Cisco Secure Analytics

On December 8, FireEye reported that it had been compromised in a sophisticated supply chain attack: more specifically through the SolarWinds Orion IT monitoring and management software. The attackers leveraged business software updates in order to distribute a malware named SUNBURST, and then used this foothold in the organization to contact their Command & Control (C&C) infrastructure, move laterally using different legitimate credentials, and steal data from the network. Fortunately, there is already a hotfix…

Read More

Monitor Your IT and OT Assets in Just One Dashboard

Monitor Your IT and OT Assets in Just One Dashboard

In October, Cisco launched two new simple-to-deploy sensor solutions: Meraki MT sensors – ideal to monitor indoor IT facilities like network closets or in the data center Cisco Industrial Asset Vision sensors – IP67 ruggedized outdoor sensors to monitor OT assets and facilities in outdoor and industrial indoor spaces When you deploy hundreds or even thousand sensors, you can easily lose track of your assets. One of the most important things for operators is to have…

Read More

Security concerns arise over popular Clubhouse app after ties to China-based company revealed

Security concerns arise over popular Clubhouse app after ties to China-based company revealed

The Stanford Internet Observatory alleged that the Chinese government may have had access to audio data from Clubhouse. Here’s what users should know. Getty Images/iStockphoto Concerns have been raised about the security of audio data on the popular new social media app Clubhouse, according to reports from the Stanford Internet Observatory and McAfee’s Advanced Threat Research team.  Stanford’s Cyber Policy Center confirmed on Feb. 12 that tools from Shanghai-based company Agora were serving as the…

Read More

Smart water starts with digitization

Smart water starts with digitization

For utilities and governments responsible for water infrastructure and services, the need to embed resilience and to improve efficiency to better protect public health is a constant. Fortunately, innovative technologies are now available that are helping address these challenges in ways that were unthinkable a few decades ago. And it’s all driven by digitization. Challenges faced by water utilities Even before the pandemic, water utilities and wastewater facilities were strained due to aging infrastructure and…

Read More

Educational Adaptation Required to Close the Cyber-Skills Gap

Educational Adaptation Required to Close the Cyber-Skills Gap

Addressing the cyber-skills gap requires a variety of career pathways and greater collaboration between governments, academia and industry, according to experts speaking during a webinar entitled Closing The Cyber Skills Gap: Can We Make a Difference? This session involved security vendor Palo Alto Networks and academics, government members and security experts from Scotland, and took place during CyberScotland week. First and foremost, a strong cybersecurity awareness and culture throughout society needs to be built. This includes…

Read More

Airplane manufacturer Bombardier has disclosed a security breach, data leaked online

Airplane manufacturer Bombardier has disclosed a security breach, data leaked online

Hackers posted data stolen from manufacturer of business jets Bombardier on Clop ransomware leak site following alleged FTA hack. Hackers exploited vulnerabilities in Accellion FTA file-sharing legacy servers to steal data from the airplane maker Bombardier and leak data on the site operated by the Clop ransomware gang. The wave of attacks exploiting multiple zero-day vulnerabilities in the Accellion File Transfer Appliance (FTA) software began in mid-December 2020, threat actors use to deploy a shell…

Read More

5 minutes with Shimrit Tzur-David – Developments in passwordless authentication technology

5 minutes with Shimrit Tzur-David – Developments in passwordless authentication technology

5 minutes with Shimrit Tzur-David – Developments in passwordless authentication technology | 2021-02-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More

Palo Alto Networks Launches NextWave 3.0 to Help Partners Build Expertise in Dynamic, High-Growth Security Markets

Palo Alto Networks Launches NextWave 3.0 to Help Partners Build Expertise in Dynamic, High-Growth Security Markets

New specializations, incentives and enablement offer partners the flexibility to differentiate and meet customers’ needs SANTA CLARA, Calif., Feb. 25, 2021 /PRNewswire/ — Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today unveiled NextWave 3.0, a significant set of enhancements, incentives and training to its award-winning NextWave Partner Program. Designed to help partners leverage all of Palo Alto Networks technologies, NextWave 3.0 will help partners differentiate their services, build new security expertise and grow…

Read More

Captains Take 5 – Nick Janetakis – Docker Blog

Captains Take 5 – Nick Janetakis – Docker Blog

Docker Captains are select members of the community that are both experts in their field and are passionate about sharing their Docker knowledge with others. “Docker Captains Take 5” is a regular blog series where we get a closer look at our Captains and ask them the same broad set of questions ranging from what their best Docker tip is to whether they prefer cats or dogs (personally, we like whales and turtles over here)….

Read More

Spending Veterans Day with My Dad  – Cisco Blogs

Spending Veterans Day with My Dad  – Cisco Blogs

Time is fleeting and being given the time to purposefully and intentionally reflect is a gift. It’s a gift that Cisco, whether by way of the 40 hours employees receive each year to give back or the holidays given off to celebrate (like the 4th of July) or honor (like Memorial Day or Veterans Day), is no stranger to.  Normally, I might spend my day off choosing to catch up on a little work (guilty…

Read More
1 3,586 3,587 3,588 3,589 3,590 3,853