Data breaches: Preventing and responding

Data breaches: Preventing and responding

It seems as though every day, there’s news of another data breach. As the threats of data breaches continue to evolve, organizations must prepare to respond. Best case scenario, organizations will take precautionary steps to prevent breaches whenever possible. But why are data breaches such a prevalent threat to the modern enterprise? Claudette McGowan, Chief Executive Officer at Protexxa, explains, “We’ve seen this rush to digitize everything. As this world is changing and going from…

Read More

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

How Cisco Uses the Isovalent Platform to Secure Cloud Workloads

As cloud environment evolve, efficient and effective workload security has been at the top of the list. At Cisco, we have integrated the Isovalent platform into our infrastructure to ensure our cloud workloads are protected without compromising on performance. Why Isovalent? The Isovalent platform is based on the eBPF (extended Berkeley Packet Filter) technology that offers a very modern approach to securing cloud-native environments. Where traditional security solutions usually fail to keep up with the…

Read More

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

This Holiday Season, Watch Out for These Cyber-Grinch Tricks

McAfee threat researchers have identified several consumer brands and product categories most frequently used by cybercriminals to trick consumers into clicking on malicious links in the first weeks of this holiday shopping season. As holiday excitement peaks and shoppers hunt for the perfect gifts and amazing deals, scammers are taking advantage of the buzz. The National Retail Federation projects holiday spending will reach between $979.5 and $989 billion this year, and cybercriminals are capitalizing by…

Read More

How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog

How to Protect Your Social Media Passwords with Multi-factor Verification | McAfee Blog

Two-step verification, two-factor authentication, multi-factor authentication…whatever your social media platform calls it, it’s an excellent way to protect your accounts. There’s a good chance you’re already using multi-factor verification with your other accounts — for your bank, your finances, your credit card, and any number of things. The way it requires an extra one-time code in addition to your login and password makes life far tougher for hackers. It’s increasingly common to see nowadays, where…

Read More

Product spotlight: GSX 2024 product preview

Product spotlight: GSX 2024 product preview

GSX — held this year from September 23 through September 25 in Orlando, Florida — provides security leaders an opportunity to network and discuss current security trends. Security magazine highlights some of the products featured at this year’s conference. Altronix Improve Access Control Deployments The NetWay5PQ from Altronix is a 5-port Managed hardened PoE+ switch designed to enhance the efficiency of access control deployments. This compact switch board powers up to four IP devices such as access…

Read More

Protecting financial institutions in the era of AI-driven threats

Protecting financial institutions in the era of AI-driven threats

As open-source AI tools become more accessible, ransomware attacks are growing increasingly sophisticated. Scammers are now using AI in targeted spear phishing attacks, where highly personalized information is used to gain access to medical or financial information.  Financial service organizations are particularly at risk when it comes to these kinds of attacks — not only do they hold and exchange large sums of money, they also store and process highly sensitive information of their customers. …

Read More

Detecting and preventing account takeover (ATO) attacks

Detecting and preventing account takeover (ATO) attacks

Account takeover (ATO) occurs when cybercriminals exploit stolen login credentials to gain unauthorized access to online accounts. ATOs can target people within organizations to steal sensitive information or customer accounts to enable fraudulent transactions. Given that ATO attacks have increased by 354% since 2023, having a strong prevention strategy is more crucial than ever to reduce risks for both customers and businesses. What is an account takeover (ATO) attack? ATO attacks can affect any organization…

Read More

Security leaders discuss the National Public Data breach

Security leaders discuss the National Public Data breach

National Public Data, a background checking organization, experienced a breach potentially affecting 2.9 billion individuals. The breach exposed personally identifiable information (PII) such as names, phone numbers, mailing addresses, email addresses and Social Security numbers.  “Organizations rely on the exchange of data for their vitality,” says Clyde Williamson, Product Management, Innovations at Protegrity. “Consumers share their personal identifiable information (PII) like Social Security numbers and emails with the expectation that businesses will protect this data…

Read More

Small businesses need to secure data before tapping into AI

Small businesses need to secure data before tapping into AI

AI is the acronym on everyone’s lips this summer. Generative AI tools have gone mainstream, and nearly everyone has heard an AI use case that piques their interest. But you’ve got questions about the cost, the security, and how to use your data because you’re a small business, not an enterprise with massive resources. AI is a growth tool that can be a game-changer for smaller businesses. Using existing AI tools to automate and streamline…

Read More
1 2 3 13