How to Offer Secure IVR Banking and Authenticate Callers

How to Offer Secure IVR Banking and Authenticate Callers

IVR banking is very common. If you’ve ever dialed your bank to check an account balance or pay a bill, you’ve probably used it. In addition to these basic self-service tasks, customers can use bank IVRs to report fraud, update personal information, check their transaction history, or even change their PIN without having to wait for an agent. Having access to a variety of options such as these makes using IVR a convenient alternative to…

Read More

NIS2 Compliance Unveiled: Operational Managers' Roadmap to Actionable Security Measures

NIS2 Compliance Unveiled: Operational Managers' Roadmap to Actionable Security Measures

Most companies acting in the European Union (EU) responsible for their own, or other, critical infrastructures already have stringent processes and procedures triggered by national and industry regulations and through implementing industry standards like IEC 62443 and IEC 62351. However, new and evolving regulations, like the upcoming implementation of the EU NIS2 Directive in each EU Member State, force companies to reassess the current state of their organizational, operational, and technical security controls, along with…

Read More

Microsoft Azure Outage Caused by DDoS Attack

Microsoft Azure Outage Caused by DDoS Attack

Microsoft has confirmed the cause of the outage on July 30 was a distributed denial-of-service attack. However, its advisory added that the issue was exacerbated by an “error in the implementation of their defenses” during a mitigation attempt. The Azure cloud services were impacted between approximately 11:45 UTC and 19:43 UTC after being flooded by internet traffic. Redmond security pros say that the Azure Front Door and Azure Content Delivery Network components were “performing below…

Read More

Top 6 Cloud Computing Certifications Worth Taking

Top 6 Cloud Computing Certifications Worth Taking

Course Spotlight: Microsoft Cloud Support Associate Professional Certificate on Coursera Our assessment: Best for going from beginner to ready for a career This certification teaches skills from the very basics of knowledge about computing to valuable professional techniques in Microsoft Azure, one of the most popular cloud platforms. This certification includes 12 courses intended to get learners up to speed on IT and cybersecurity, Microsoft 365, cloud management and professional cloud administration. The courses included…

Read More

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

A vulnerability in the ESXi hypervisor was patched by VMware last week, but Microsoft has revealed that it has already been exploited by ransomware groups to gain administrative permissions. VMware ESXi is a bare-metal hypervisor that enables the creation and management of virtual machines directly on server hardware, which may include critical servers. CVE-2024-37085 is an authentication bypass vulnerability that allows malicious actors with sufficient permissions to gain full access to a domain-joined ESXi host….

Read More

Google Workspace Vulnerability Allowed Thousands of Emails to be Compromised

Google Workspace Vulnerability Allowed Thousands of Emails to be Compromised

Thousands of email addresses have been compromised after hackers used them to create Google Workspace accounts and bypassed the verification process. According to Google, a “specially constructed request” could open a Workspace account without verifying the email. This meant that bad actors only required the email address of their desired target to impersonate them. While none of the fake accounts were used to abuse Google services, like Gmail or Docs, they were used to access…

Read More

Introducing the Coalition for Secure AI (CoSAI)

Introducing the Coalition for Secure AI (CoSAI)

Today, I am delighted to share the launch of the Coalition for Secure AI (CoSAI). CoSAI is an alliance of industry leaders, researchers, and developers dedicated to enhancing the security of AI implementations. CoSAI operates under the auspices of OASIS Open, the international standards and open-source consortium. CoSAI’s founding members include industry leaders such as OpenAI, Anthropic, Amazon, Cisco, Cohere, GenLab, Google, IBM, Intel, Microsoft, Nvidia, Wiz, Chainguard, and PayPal. Together, our goal is to…

Read More

Introducing the Coalition for Secure AI (CoSAI)

Introducing the Coalition for Secure AI (CoSAI)

Today, I am delighted to share the launch of the Coalition for Secure AI (CoSAI). CoSAI is an alliance of industry leaders, researchers, and developers dedicated to enhancing the security of AI implementations. CoSAI operates under the auspices of OASIS Open, the international standards and open-source consortium. CoSAI’s founding members include industry leaders such as OpenAI, Anthropic, Amazon, Cisco, Cohere, GenLab, Google, IBM, Intel, Microsoft, Nvidia, Wiz, Chainguard, and PayPal. Together, our goal is to…

Read More

Introducing the Coalition for Secure AI (CoSAI)

Introducing the Coalition for Secure AI (CoSAI)

Today, I am delighted to share the launch of the Coalition for Secure AI (CoSAI). CoSAI is an alliance of industry leaders, researchers, and developers dedicated to enhancing the security of AI implementations. CoSAI operates under the auspices of OASIS Open, the international standards and open-source consortium. CoSAI’s founding members include industry leaders such as OpenAI, Anthropic, Amazon, Cisco, Cohere, GenLab, Google, IBM, Intel, Microsoft, Nvidia, and PayPal. Together, our goal is to create a…

Read More

Accelerating SaaS solution delivery to the U.S. Federal Government

Accelerating SaaS solution delivery to the U.S. Federal Government

Synopsis: The Cisco Federal Operational Security Stack streamlines the process for Cisco SaaS solutions on their FedRAMP journey, bringing a myriad of benefits. It revolutionizes product engineering team workflows by offering a centralized and integrated suite of tools and services that cover a significant number of FedRAMP security requirements. This efficiency decreases engineering team effort, enabling them to focus on enriching solution features and accelerating their FedRAMP readiness. In 2023, the FedRAMP Authorization Act was…

Read More
1 3 4 5 6 7 15