Automated Tools Increasingly Used to Launch Cyber-Attacks

Automated Tools Increasingly Used to Launch Cyber-Attacks

Cyber-criminals are increasingly making use of automation and bots to launch attacks, according to a new analysis by Barracuda Networks. In its new report, Threat Spotlight: Automated attacks on web applications, the cybersecurity firm revealed that over half (54%) of all cyber-attacks it blocked in November and December were web application attacks which involved the use of automated tools. The most prevalent form was fuzzing attacks, making up around one in five (19.5%). This uses…

Read More

IBM Announces Cybersecurity Grants for US Schools

IBM Announces Cybersecurity Grants for US Schools

American technology company IBM announced today that it will be making $3m available to US public schools in the form of cybersecurity grants. Grants in the form of in-kind services will be awarded to six school districts to sponsor “teams of IBMers” from the company’s Service Corps Program who will help schools proactively prepare for cyber-attacks and learn how to mitigate them.  The announcement comes after an IBM-sponsored study revealed that nearly 60% of school staff are unprepared…

Read More

Conversation with a networking prodigy – Cisco Blogs

Conversation with a networking prodigy – Cisco Blogs

Valery Linkov built his first radio at age six, assembled his first computer at 12, won a national competition at age 18, and today, at 21, is a Cisco Networking Academy instructor. Valery was interested in computers as far back as he can remember – but living in his hometown of Moscow, Russia made it challenging for him to access to the necessary tools or equipment. I had an opportunity to talk with Valery to…

Read More

New Year, New Pipeline. Jumpstart your 2021 with Cisco MDR – Cisco Blogs

New Year, New Pipeline. Jumpstart your 2021 with Cisco MDR – Cisco Blogs

With 2020 in the rear-view mirror and 2021 underway, we can already see this is another year of change. And where there’s change, there’s opportunity. With the massive shift in remote working, security attacks from tenacious hackers, and the ever-present need to keep businesses running securely, cybersecurity has taken center stage. Customers worldwide are hyper-aware of the need for cybersecurity, but not all are prepared or can afford it. The question to you, our valued…

Read More

Sloppy patches are a breeding ground for zero-day exploits

Sloppy patches are a breeding ground for zero-day exploits

Security researchers at Google have claimed that a quarter of all zero-day software exploits could have been avoided if more effort had been made by vendors when creating patches for vulnerabilities in their software. In a blog post, Maddie Stone of Google’s Project Zero team says that 25% of the zero-day exploits detected in 2020 are closely related to previously publicly disclosed vulnerabilities, and “potentially could have been avoided if a more thorough investigation and…

Read More

Donating Docker Distribution to the CNCF – Docker Blog

Donating Docker Distribution to the CNCF – Docker Blog

We are happy to announce that Docker has contributed Docker Distribution to the Cloud Native Computing Foundation (CNCF). Docker is committed to the Open Source community and open standards for many of our projects, and this move will ensure Docker Distribution has a broad group maintaining what is the foundation for many registries.  What is Docker Distribution? Distribution is the open source code that is the basis of the container registry that is part of Docker…

Read More

Why schools are vulnerable to ransomware attacks

Why schools are vulnerable to ransomware attacks

A lack of security training for educators and budget limitations are two reasons schools are susceptible to cyberattack, says IBM Security. Image: iStock/Maria Symchych-Navrotska Preventing ransomware and other attacks is challenging enough if you work for a large corporation with the means to educate your employees and spend the necessary money on cybersecurity. But if you’re at a smaller organization, such as a school, with a tiny budget and limited security training, combating cyberattacks is…

Read More

Disclosed ICS Vulnerabilities Surged During Second Half of 2020

Disclosed ICS Vulnerabilities Surged During Second Half of 2020

A substantial rise in industrial control system (ICS) vulnerabilities were detected in the second half of 2020, according to Claroty’s second Biannual ICS Risk & Vulnerability Report. The research revealed that there had been a 25% year-on-year rise in ICS vulnerabilities disclosed in this period, and a 33% increase compared to H1 of 2020. Throughout the six-months, a total of 449 vulnerabilities affecting ICS products from 59 vendors were highlighted, 70% of which were assigned…

Read More

Proofpoint Announces Fourth Quarter and Full Year 2020 Financial Results | Proofpoint US

Proofpoint Announces Fourth Quarter and Full Year 2020 Financial Results | Proofpoint US

Fourth Quarter Highlights Total revenue of $275.1 million, up 13% year-over-year Billings of $374.9 million, up 8% year-over-year GAAP EPS of $(0.61) per share, Non-GAAP EPS of $0.51 per share Operating cash flow of $55.7 million and free cash flow of $28.9 million SUNNYVALE, Calif., – February 4, 2021 – Proofpoint, Inc. (NASDAQ: PFPT), a leading next-generation security and compliance company, today announced financial results for the fourth quarter and full year ended December 31,…

Read More

Access is the new mobility in transportatioon

Access is the new mobility in transportatioon

For public transportation, a new concept of mobility has emerged over the last year. As reduced traffic demands and altered usage patterns have evolved, transportation agencies have had to adapt their approach to transportation planning. During a recent Q&A with Government Technology, I discussed how access is the new mobility, and its impacts on how we perceive the role of public transportation in our everyday lives. Changing behaviors in public transportation In a relatively short…

Read More
1 3,629 3,630 3,631 3,632 3,633 3,843