MoviePass Operators Settle Data Security Allegations

MoviePass Operators Settle Data Security Allegations

The operators of subscription service MoviePass have agreed to settle Federal Trade Commission allegations of fraud and data security failures.  It is alleged that MoviePass used an elaborate three-prong approach to prevent and discourage subscribers from using its $9.95 “one movie a day” monthly subscription service as advertised. First, according to the FTC complaint, the company blocked as many as 75,000 subscribers from accessing content by purposefully invalidating their passwords.  The FTC said: “MoviePass’s operators invalidated subscriber passwords…

Read More

Control Cisco Secure Workload Using APIs, Ansible, and Terraform

Control Cisco Secure Workload Using APIs, Ansible, and Terraform

Cisco Secure Workload, (formerly Cisco Tetration) provides policy lifecycle services, micro-segmentation, and cloud workload protection. Furthermore, it is completely accessible via open APIs and by using Ansible and Terraform. It is also part of Cisco Application-First Security and a pillar of the Cisco Zero Trust architecture.   Do you want to learn more about Cisco Secure Workload, and how to control it using APIs, Ansible and Terraform?Register here for the webinarTuesday, June 15th, 8:00 AM PDT …

Read More

Cyber-attack on NYC Law Department

Cyber-attack on NYC Law Department

An intrusion into the IT system of the New York City Law Department is being co-investigated by the New York Police Department and the FBI’s Cyber Task Force. The hack was first reported by The Daily News, which learned that sensitive information belonging to more than a thousand department employees may have been exposed in the security incident. After discovering the intrusion, the city restricted admission to the system, preventing government lawyers from accessing documents.  On…

Read More

Top 5 things to know about medical data security

Top 5 things to know about medical data security

Medical data is a valuable commodity—one that needs to be protected from cybersecurity threats. Tom Merritt lists five things to know about medical data security. Seth Rosenblatt’s “The Parallax View” recently posted about medical vulnerabilities found by CybelAngel’s senior cybersecurity analyst, David Sygula. TechCrunch had a similar writeup about warnings for medical imaging from Greenbone Networks’ lead researcher, Dirk Schrader. Last December, Kaspersky project manager Maria Namestnikova warned that software used by medical organizations is…

Read More

Paving the way: Inspiring Women in Payments – A podcast featuring Carey Ferro

Paving the way: Inspiring Women in Payments – A podcast featuring Carey Ferro

  Carey Ferro credits much of her success to having a healthy sense of curiosity. Asking questions and understanding how things work at an early age can help one shape and grow technology as a lifelong passion. But even more important, Carey says learning to practice reflection is an essential part of continued personal growth and finding balance in one’s life. In this edition of our podcast, Carey discusses the importance of curiosity, courage, and…

Read More

TrustSec Policy Analytics – Part Two: Policy Visualization

TrustSec Policy Analytics – Part Two: Policy Visualization

In Part One of the Cisco TrustSec Policy Analytics blog series, Samuel Brown addressed some of the challenges related to designing group-based security policies and introduced one of the new feature sets of Cisco Secure Network Analytics – TrustSec Analytics reports. In this blog, we’ll dive a little bit deeper into the challenges associated with designing segmentation policies and how TrustSec Analytics reports and the visibility they provide can help make this easier. I’d like…

Read More

Illinois County Stricken with Grief

Illinois County Stricken with Grief

A new organized cybercrime group claims to have stolen sensitive data belonging to a county in Illinois.  St. Clair County disabled its website on June 2 out of “an abundance of caution” after suffering a cyber-attack. Ransomware gang Grief has claimed responsibility for the digital assault.   Because of the incident, several county services were rendered unavailable from May 28, including access to court records and payment for ticket fees.  The county jail’s network was also impacted, with…

Read More

Edge intelligence for midstream oil and gas operators – Cisco Blogs

Edge intelligence for midstream oil and gas operators – Cisco Blogs

For midstream oil and gas operators, data flow can be as important as product flow. The operator’s job is to safely move oil and natural gas from its extraction point (upstream), to where it’s converted to fuels (midstream), to customer delivery locations (downstream). During this process, pump stations, meter stations, storage sites, interconnection points, and block valves generate a substantial volume and variety of data that can lead to increased efficiency and safety. “Just one…

Read More

Keeping Cool with QSFP-DD800 Optics – Cisco Blogs

Keeping Cool with QSFP-DD800 Optics – Cisco Blogs

History has been very clear that for broad industry adoption of the 800G generation, an optical pluggable form factor must be judged on:(1) Backwards compatibility with previous generation optics(2) 100G+ electrical performance(3) Excellent thermal power dissipation The recent QSFP-DD MSA updates ensure all of these, but I’d like to focus on the thermal performance here. Starting with 400G modules and continuing with 800G pluggable modules, the challenge of thermals and keeping optical pluggable modules cool…

Read More
1 3,759 3,760 3,761 3,762 3,763 4,278