Strike a balance: Ensuring secure remote work without hindering productivity

Strike a balance: Ensuring secure remote work without hindering productivity

Remote work will be a permanent scenario for many organizations, according to the CIO Pandemic Business Impact Survey 2020. This underscores the need for policies that secure remote data access without inhibiting user productivity. “Given the paradigm shift to remote work, companies must protect their IT infrastructure — including networks, application servers, and VPN access points — against distributed denial-of-service attacks comprehensively on all levels and across all platforms,” says Mark Wilczek (@MarcWilczek), COO at…

Read More

5 building blocks of a well-developed security culture

5 building blocks of a well-developed security culture

A defined security culture is helping the financial industry, though the fundamentals should apply to any business. Image: Getty Images/iStockphoto I remember watching a bank being built. After the concrete foundation and ground floor were in place, workers began building a massive concrete and steel box right in the middle of the building’s floor. It finally dawned on me: That was the vault. It seemed impenetrable.  Financial institutions are hypervigilant when it comes to security….

Read More

Threat Advisory: SolarWinds supply chain attack – Cisco Blogs

Threat Advisory: SolarWinds supply chain attack – Cisco Blogs

Cisco Blogs / Security / Threat Research / Threat Advisory: SolarWinds supply chain attack Cisco Talos is monitoring yesterday’s announcements by FireEye and Microsoft that a likely state-sponsored actor compromised potentially thousands of high-value government and private organizations around the world via the SolarWinds Orion product. FireEye reported on Dec. 8 that it had been compromised in a sophisticated attack in which state-sponsored actors stole sensitive red team tools. Upon investigating the breach further, FireEye…

Read More

EDR. NDR? XDR! … is it more than just marketing? – Cisco Blogs

EDR. NDR? XDR! … is it more than just marketing? – Cisco Blogs

As is often true with new security concepts, vendors are quickly adopting the new terminology to showcase their products’ capabilities. This is where things get confusing and tricky. Some vendors are using XDR (Extended Detection & Response) as a marketing strategy for their existing EDR (Endpoint Detection & Response) or NDR (Network Detection & Response) products, others are launching new products or just rebranding existing products explicitly as “XDR”. Some vendors have built both EDR…

Read More

Try Programmability & Edge Computing on the Cisco IE3400 switch

Try Programmability & Edge Computing on the Cisco IE3400 switch

We’ve got a real good treat for you! Now you can get hands-on with a real Cisco industrial switch, the Cisco Catalyst IE3400, from your home. The switches in this rugged series can be DIN-rail mounted with IP30 or even IP67 (IE3400 Heavy Duty) providing protection against dust and submersion in water. Hardened for vibration, shock and surge, the most robust switch model can operate under extreme temperatures of (–40°C to 75°C [–40°F to 167°F])….

Read More

Pornhub Removes All Unverified Content

Pornhub Removes All Unverified Content

One of the internet’s most popular purveyors of pornography has removed all unverified content from its website. Pornhub said it took the step last week in an effort to combat the rising tide of Child Sexual Abuse Material (CSAM) flooding the internet. Unverified uploaders have been banned from posting new content, and downloads have been eliminated. Currently, only content partners and people within the site’s Model Program can upload content to Pornhub. However, the site…

Read More

Kaspersky: Gamers face high and ongoing risk of identity theft and bullying

Kaspersky: Gamers face high and ongoing risk of identity theft and bullying

A survey of gamers worldwide found that gamers deal with bullying and theft of in-game valuables in addition to identity theft. Internet identity theft on a digital tablet with reflection of hackers hand concept for online digital crime American gamers are at a higher risk for identity theft than gamers around the world, according to new research from security firm Kaspersky. Twenty-seven percent of gamers in the US have had their ID stolen compared to…

Read More

Solorigate: SolarWinds Orion Platform Contained a Backdoor Since March 2020 (SUNBURST)

Solorigate: SolarWinds Orion Platform Contained a Backdoor Since March 2020 (SUNBURST)

Nation-state threat actors breached the supply chain of a popular IT management software provider in order to infiltrate government agencies and private companies. Update December 16: The Solution and Identifying Affected Systems sections have been updated to reflect the availability of Hotfix 2 and a new Tenable plugin. Background On December 13, several news outlets, including Reuters, The Washington Post and The Wall Street Journal, reported that multiple U.S. government agencies were the victims of…

Read More

US Jails Journalists’ Cyber-Stalker

US Jails Journalists’ Cyber-Stalker

A cyber-stalker from Arizona who joined up with a neo-Nazi group to harass and threaten journalists, advocates, and other targets has been sentenced to prison. Johnny Roman Garza admitted to conspiring with other members of the Atomwaffen Division to deliver menacing messages to journalists online and in person, sometimes targeting their homes. The campaign was created to intimidate individuals who had exposed anti-Semitic behavior.  The 21-year-old confessed to affixing a threatening poster to the bedroom window of…

Read More

US government agencies compromised by foreign nation-state

US government agencies compromised by foreign nation-state

Stretching back for months, the breaches were pulled off by exploiting a vulnerability in network monitoring software from SolarWinds, according to security firm FireEye. Image: Getty Images/iStockphoto Foreign adversaries have launched a series of cyberattacks against key government agencies by exploiting a flaw in software used by many of them. Affecting the networks and email systems of the targeted agencies, the malicious campaign dubbed UNC2452 by security firm FireEye took advantage of a vulnerability in…

Read More
1 3,695 3,696 3,697 3,698 3,699 3,821