The future of account security must be democratized

The future of account security must be democratized

The future of account security must be democratized | 2020-12-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

A matter of trust

A matter of trust

A matter of trust | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Protecting critical infrastructure and distributed organizations in an era of chronic cybersecurity risk

Protecting critical infrastructure and distributed organizations in an era of chronic cybersecurity risk

Protecting critical infrastructure and distributed organizations in an era of chronic cybersecurity risk | 2020-12-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Multi-factor authentication for HIPAA compliance: What it is, common objections, and why to insist on it

Multi-factor authentication for HIPAA compliance: What it is, common objections, and why to insist on it

Multi-factor authentication for HIPAA compliance: What it is, common objections, and why to insist on it | 2020-12-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated…

Read More

5 Key Security Challenges Facing Critical National Infrastructure (CNI)

5 Key Security Challenges Facing Critical National Infrastructure (CNI)

Digital threats confronting Critical National Infrastructure (CNI) are on the rise. That’s because attackers are increasingly going after the Operational Technology (OT) and Industrial Control Systems (ICS) that shareholders use to protect these assets. In their report “Caught in the Crosshairs: Are Utilities Keeping Up with the Industrial Cyber Threat?,” for instance, Siemens and the Ponemon Institute found that 64% of respondents considered sophisticated attacks against the utilities sector a top challenge. Slightly less than…

Read More

PyMICROPSIA Windows malware includes checks for Linux and macOS – Cyber Defense Magazine

PyMICROPSIA Windows malware includes checks for Linux and macOS – Cyber Defense Magazine

Experts discovered a new Windows info-stealer, named PyMICROPSIA, linked to AridViper group that is rapidly evolving to target other platforms. Experts from Palo Alto Networks’s Unit 42 discovered a new Windows info-stealing malware, named PyMICROPSIA, that might be used soon to also target Linux and macOS systems. Experts spotted the PyMICROPSIA info stealer while investigating attacks of the AridViper group (also tracked as Desert Falcon and APT-C-23). AridViper is an Arabic speaking APT group that is active in the…

Read More

How Apple’s new App Store privacy requirements may affect users and app developers

How Apple’s new App Store privacy requirements may affect users and app developers

Apple now requires apps to reveal how user data may be collected, but some companies aren’t happy about the policy. Image: Shara Tibken/CNET The next time you try to download an app from the App Store onto your iPhone or iPad, you may notice a new App Privacy section that seeks to clue you in on certain details. Specifically, the section tells you how the data from the app might be used to track you…

Read More

With AI maturing, are humans still needed to fight cybercrime?

With AI maturing, are humans still needed to fight cybercrime?

Cybercriminals are clever, and AI cannot always account for that. This is where cybersecurity and AI professionals come in. Image: iStockphoto/metamorworks Experts are urging caution and expressing doubts that artificial intelligence (AI) is the end-all answer when it comes to cybersecurity. AI will likely help immensely, but we shouldn’t start celebrating that cybercriminals will soon find themselves unemployed.  Major Jimmy Housley, Commandant of the Marine Corps Fellow at the United States Chamber of Commerce, is…

Read More

Cisco takes additional steps to fight counterfeit network gear

Cisco takes additional steps to fight counterfeit network gear

Looking to counter the growing sophistication of counterfeit networking products, Cisco recently added new layers to protect customers. “Counterfeiting hardware and software is an illegal and lucrative trade which leads to an estimated $100B loss of revenue annually across IT industries. As one of the largest and most reputable brands in the world, Cisco is often a target of counterfeiters,” said Al Palladin, legal director and  head of Global Brand Protection at Cisco. Counterfeiting presents…

Read More

Forget the New Normal. Experience a New Difference With The All New Webex

Forget the New Normal. Experience a New Difference With The All New Webex

Staying Connected and Getting Work Done with the All New Webex The rapid uptake of remote working has led to a parallel increase in use of Webex as businesses key collaboration tool for colleagues to stay connected and get work done. The power of the all new Webex is the ability to bring together everything you need to see a project through to fruition – One easy-to-use and secure app to call, message, meet and make…

Read More
1 3,687 3,688 3,689 3,690 3,691 3,821