FireEye, SolarWinds Hacks Show that Detection is Key to Solid Defense

FireEye, SolarWinds Hacks Show that Detection is Key to Solid Defense

Several years back, industry analyst firm Gartner began circulating the idea that almost every major enterprise and government agency was either compromised or would be compromised at some point in time. This week, when we woke up to the news that FireEye and SolarWinds had joined the ranks of the hacked, we learned once again that Gartner was right. Even companies with advanced security expertise and expansive resources can’t escape this inevitable fact of digital…

Read More

Healthcare.gov Data Thief Jailed

Healthcare.gov Data Thief Jailed

An employee at a tech company based in Virginia has been sent to prison for stealing personally identifiable information (PII) from Healthcare.gov customers and exploiting it for profit.  Colbi Trent Defiore accessed data belonging to more than 8,000 individuals without authorization while working at a contact center in Bogalusa, Louisiana. The 27-year-old then stole the data and used it fraudulently for his own personal financial gain, applying for credit cards and personal loans.  At the…

Read More

Dear Hank… Help Me with RESTCONF URL Creation

Dear Hank… Help Me with RESTCONF URL Creation

I occasionally get questions sent from engineers working on network automation. I am humbled that anyone would think of me when they are stuck on a question, and if it’s a question that I can help with I like to take the time to reply. Recently I received an email from an engineer who was working through my Network Programmability Basics Video Course on DevNet. Their question related to understanding how the URLs for RESTCONF…

Read More

The worst bugs in the top programming languages

The worst bugs in the top programming languages

A heatmap shows PHP has the most flaws followed by C++, then Java, .Net, JavaScript, and Python in Veracode’s annual security report. Getty Images/iStockphoto Veracode has released the 11th volume of its annual State of Software Security report, and its findings reveal that flawed applications are the norm, open-source libraries are increasingly untrustworthy, and it’s taking a long time to patch problems. The report found a full 76% of apps contained flaws, and 24% of…

Read More

Indian Police Bust Illegal Call Center

Indian Police Bust Illegal Call Center

Police in India have arrested 54 people in a raid on an illegal call center that targeted foreign nationals with fraud scams. The Delhi cybercrime unit launched an investigation after receiving intelligence that a large-scale fraud operation was being run from a location in Moti Nagar, New Delhi.  Police were informed that a team of scammers were calling up targets in America and other countries and conning them into transferring money to criminals via Bitcoin wallets and…

Read More

The Why of AI and ML

The Why of AI and ML

In recent years, Artificial Intelligence (AI) and Machine Learning (ML) have been in the spotlight. I think by now folks understand that neither are some strange form of technological magic, but rather a science and some working knowledge of the domain is now well understood. However, up to this point, the question has been “what are AI and ML?”  But what I want to take some time to ask, is why? Why do we need…

Read More

My Personal Message of Deep Gratitude to our Distributors and Partners – Cisco Blogs

My Personal Message of Deep Gratitude to our Distributors and Partners – Cisco Blogs

2020 is almost at an end, and it has been a year that summoned our reserves of adaptability and innovation. We learned new ways to help each other. I have learned lessons that I will take with me through the rest of my life. Mostly, I learned about trust. I learned how essential it is to be able to count on our partners. I learned how important it is to be the kind of company…

Read More

3 Reasons Why Connected Apps are Critical to Enterprise Security | McAfee Blogs

3 Reasons Why Connected Apps are Critical to Enterprise Security | McAfee Blogs

Every day, new apps are developed to solve problems and create efficiency in individuals’ lives.  Employees are continually experimenting with new apps to enhance productivity and simplify complex matters. When in a pinch, using DropBox to share large files or an online PDF editor for quick modifications are commonalities among employees. However, these apps, although useful, may not be sanctioned or observable by an IT department. The rapid adoption of this process, while bringing the benefit of increased productivity and agility, also raises the ‘shadow IT problem’ where IT has little to no visibility into…

Read More

Tools for planning and preserving PPE resources at your enterprise

Tools for planning and preserving PPE resources at your enterprise

Tools for planning and preserving PPE resources at your enterprise | 2020-12-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Anomali December Release: The Need for Speed

Anomali December Release: The Need for Speed

We are happy to announce the Anomali Quarterly Release for December 2020. For our product and engineering teams to deliver this latest set of features and enhancements, they worked closely with our customers with a particular eye to further improving the speed of threat intelligence operations. As organizations mature in their threat intelligence programs and seek to leverage ever-larger quantities of threat intelligence inputs and security telemetry data, the need for capabilities that enhance the…

Read More
1 3,685 3,686 3,687 3,688 3,689 3,821