Cybersecurity Challenges: The What, How and When of Change

Cybersecurity Challenges: The What, How and When of Change

I subscribe to a newsletter from Gary Burnison, CEO of Korn Ferry. His messages address a wide variety of career and personal issues in a thoughtful and educational manner. A recent Special Edition message was titled Exceeding Potential. It specifically addressed how opportunities present themselves and how to view and leverage them. He closed his message with this statement: It’s true that leaders are in the “what,” “how,” and the “when” business. But, ultimately, we…

Read More

Risks & Responses to Cloud-Based Storage Misconfigurations

Risks & Responses to Cloud-Based Storage Misconfigurations

Misconfigurations remain one of the most common risks in the technology world. Simply telling organisations to “fix” this problem, however, is not as easy as it might first seem because there’s a myriad of technologies at play in modern infrastructure deployments. All of this results in a complicated mix of hardening approaches for each system. What is key, then, is to identify where hardening is required and then consider the methodology for each area. Even…

Read More

T-Mobile customers were hit with SIM swapping attacks

T-Mobile customers were hit with SIM swapping attacks

The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM swap attacks. The telecommunications provider T-Mobile has disclosed a data breach after it became aware that some of its customers were allegedly victims of SIM swap attacks. Crooks conduct SIM swapping attacks to take control of victims’ phone numbers tricking the mobile operator employees into porting them to SIMs under the control of the fraudsters. Once hijacked…

Read More

Cisco closes $4.5B deal on optical powerhouse Acacia

Cisco closes .5B deal on optical powerhouse Acacia

After some legal wrangling earlier this year, Cisco has closed the $4.5 billion deal for optical maker Acacia Communications, Inc.  Cisco coveted Acacia for its high-speed, optical interconnect technologies that let data center operators, webscale companies and service providers offer ever-faster service access to widely distributed resources. It also reinforces Cisco’s commitment to optics as a critical building block for networks of the future.  “Acacia offers a complete portfolio of long-distance data-transmission solutions that address…

Read More

United Airlines to Pay $49m to Settle False Data Claim

United Airlines to Pay m to Settle False Data Claim

United Airlines Inc. has agreed to pay $49m to resolve criminal charges and civil claims that it was defrauding the United States Postal Service. The world’s third largest airline entered into International Commercial Air (ICAIR) contracts to transport mail internationally on behalf of the postal service. Under the contracts, United was entitled to full payment only if accurate barcode scans were provided for deliveries and mail was delivered in a timely manner.  Between 2012 and 2015, United engaged…

Read More

Take It from A CISO: Successful Transformation Depends on Your Plan for These 7 Forces

Take It from A CISO: Successful Transformation Depends on Your Plan for These 7 Forces

At the monumental intersection of digital transformation, an industry-wide focus on SASE, and the continuing effects of COVID-19 on the way workforces function, we have never experienced such a seismic shift in all facets of business over such a short period of time. Today we see this transformation driving changes to corporate culture, business processes, and technology at such a rapid pace, our current security strategy cannot keep up. Unlike past evolutions that were driven…

Read More

When Businesses Get Hacked- Who Are the Victims?

When Businesses Get Hacked- Who Are the Victims?

This article looks into who the victims are when an organization comes under attack. By Nicole Allen, Marketing Executive, SaltDNA. Cyber-attacks occur every two and a half minutes, according to Government statistics, which is why ensuring that your company is protected and secure is critical. Threats can come in several different forms that vary depending on their severity. Hackers are deliberately trying to inflict damage in order to persuade employees to make one mistake which…

Read More

Florida Police Arrest 12 Alleged Online Predators

Florida Police Arrest 12 Alleged Online Predators

Law enforcement officers in Florida’s Marion County have arrested a dozen men in a sting operation to catch sexual predators who use the internet to target children. According to the Marion County Sheriff’s Office, the 12 defendants were caught chatting online with users who they believed to be children. In reality, the suspects were talking with undercover detectives. The men arrested in the operation are 18-year-old Allen Vasquez of Jacksonville, Donald Dziadyk, Brayant McCullough, 21-year-old Robin Strickland…

Read More

Facebook Photo-tagging Lawsuit Settled for $650m

Facebook Photo-tagging Lawsuit Settled for 0m

Facebook is to pay $650m to users in Illinois who accused the company of using their biometric data without first obtaining their consent.  Nearly 1.6 million users in the Prairie State joined a class-action lawsuit filed against Facebook in April 2015 in Cook County Circuit Court on behalf of plaintiff Carlo Licata.  The lawsuit alleged that the social media giant had violated an Illinois privacy law by using facial-recognition technology to scan photos uploaded by users and by digitally…

Read More

Work Anywhere, Securely, with Citrix and Cisco Duo – Cisco Blogs

Work Anywhere, Securely, with Citrix and Cisco Duo – Cisco Blogs

Working remotely has become the norm for enterprise employees. At the same time, the risk of cyberattacks is ever-present. As a result, it has become top of mind for companies to enable secure business continuity for these workers, while also delivering an optimal user experience. Simply put, businesses must protect their employees and intellectual property but not at the expense of reduced productivity and decreased employee satisfaction. To address these challenges, Citrix and Cisco Duo…

Read More
1 3,808 3,809 3,810 3,811 3,812 4,084