Bringing My Full Self to Work – Cisco Blogs

Bringing My Full Self to Work – Cisco Blogs

Leaving college to enter the “real” world always was a scary thought for me. At the end of the day, a new job means presenting yourself to a new group of people. There is always anxiety when meeting new people, however, for those in the LGBTQ+ community – this anxiety extends into many more layers and ultimately needing to find safe spaces where we can truly be ourselves. In 2016, I received a call for…

Read More

Meat Processing Giant JBS Pulls IT Plug After Cyber-Attack

Meat Processing Giant JBS Pulls IT Plug After Cyber-Attack

The world’s largest meat processor has been forced to cut the servers supporting two major global markets after an organized cyber-attack. Sao Paolo-headquartered JBS noted in a statement today (via Beef Central) that its US division detected the attack on Sunday. It apparently affected some of the servers used to power its North American and Australian IT systems. “The company took immediate action, suspending all affected systems, notifying authorities and activating the company’s global network of…

Read More

How to Apply the Risk Management Framework (RMF)

How to Apply the Risk Management Framework (RMF)

The Risk Management Framework (RMF) is most commonly associated with the NIST SP 800-37 guide for “Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach,” which has been available for FISMA compliance since 2004.  It was updated in December 2018 to revision 2. This was the result of a Joint Task Force Transformation Initiative Interagency Working Group; it’s something that every agency of the U.S. government must now abide by and…

Read More

Interpol Seizes $83 Million Headed for Online Scammers

Interpol Seizes  Million Headed for Online Scammers

Global police have concluded a months-long campaign in which they seized $83 million in funds headed for the bank accounts of cyber-criminals and scammers. Interpol said that 40 officers from across APAC participated in the HAECHI-I operation over a six-month period. It focused specifically on investment fraud, romance scams, money laundering associated with illegal online gambling, online sextortion and voice phishing (vishing). All have become major money-makers for threat actors of late. Romance and investment…

Read More

A Safer Internet for You, Your Family, and Others Too

A Safer Internet for You, Your Family, and Others Too

With so many of us relying on the internet in ways we simply haven’t before, it follows that a safer internet is more important than ever before too.   June marks Internet Safety Month, a time where we can look back at the past year and realize that the internet was more than just a coping mechanism during the pandemic, it evolved into a survival tool.   Our research published earlier this year showed how. It found that we relied heavily on the internet for our banking,…

Read More

A Safer Internet for You, Your Family, and Others Too

A Safer Internet for You, Your Family, and Others Too

With so many of us relying on the internet in ways we simply haven’t before, it follows that a safer internet is more important than ever before too.   June marks Internet Safety Month, a time where we can look back at the past year and realize that the internet was more than just a coping mechanism during the pandemic, it evolved into a survival tool.   Our research published earlier this year showed how. It found that we relied heavily on the internet for our banking,…

Read More

A Safer Internet for You, Your Family, and Others Too | McAfee Blogs

A Safer Internet for You, Your Family, and Others Too | McAfee Blogs

With so many of us relying on the internet in ways we simply haven’t before, it follows that a safer internet is more important than ever before too.   June marks Internet Safety Month, a time where we can look back at the past year and realize that the internet was more than just a coping mechanism during the pandemic, it evolved into a survival tool.   Our research published earlier this year showed how. It found that we relied heavily on the internet for our banking,…

Read More

Walking the line: Navigating the insider threat

Walking the line: Navigating the insider threat

Walking the line: Navigating the insider threat | 2021-06-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Certifications and the security leader

Certifications and the security leader

Certifications and the security leader | 2021-06-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Is job title an accurate indicator of your security career?

Is job title an accurate indicator of your security career?

Is job title an accurate indicator of your security career? | 2021-06-01 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More
1 3,772 3,773 3,774 3,775 3,776 4,271