-
How acceptable is your acceptable use policy?
PRIVACY PRIVACY In a world before smartphones, social media, and hybrid workplaces, an acceptable use policy was a lot easier to write—and to enforce. These days, it’s a lot more complicated. Work can take place almost anywhere, on any number of devices. An employee can accept a job and then never physically set foot in…
-
Two Zero-Days Fixed in December Patch Tuesday
PRIVACY PRIVACY Close to 50 CVEs addressed this month Read More
-
FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked
PRIVACY PRIVACY InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI) to build cyber and physical threat information sharing partnerships with the private sector, this week saw its database of contact information on more than 80,000 members go up for sale on an English-language cybercrime forum. Meanwhile, the hackers responsible are communicating…
-
BrandPost: Securing Operational Technology Environments for Critical Infrastructure
PRIVACY PRIVACY Juniper Networks is applying its industry leading AI-driven capabilities and cloud-native architectures to Critical Infrastructure (CI) networks. We’re directly addressing the communications and cybersecurity challenges exposed by the convergence of IT and OT networks alongside the ever-increasing drumbeat of cyber threats from sophisticated, state-sponsored malicious actors. By enabling network architects, builders, and operators…
-
Palo Alto Networks flags top cyberthreats, offers new zero-day protections
PRIVACY PRIVACY Firewall and security software vendor Palo Alto Network’s annual Ignite conference kicked off Tuesday, highlighted by several product announcements, which were unveiled alongside the company’s latest threat report. Palo Alto’s “What’s Next in Cyber” report named ransomware and business email compromise as the most common attacks faced by businesses worldwide, with supply chain…
-
European Commission takes step toward approving EU-US data privacy pact
PRIVACY PRIVACY The EU-US Data Privacy Framework—drafted to allow the flow of data between the US and the European Union—has cleared the first hurdle on its way to approval in the EU, but criticism of the pact makes it far from a done deal. Read More
-
Twitter Addresses November Data Leak Claims
PRIVACY PRIVACY No passwords were reportedly exposed, but Twitter prompted users to enable 2FA to protect accounts Read More
-
Know Your Superpower: Brenda’s McAfee Journey
PRIVACY PRIVACY Our How I Got Here series spotlights the stories of McAfee team members who have successfully grown their careers. Read more about Brenda’s McAfee’s journey, what a day in the McAfee sales team is like, and what her superpower is. Embracing opportunities When I started my professional career, I was in technology but one of the…
-
California Hit By Cyber-Attack, LockBit Claims Responsibility
PRIVACY PRIVACY At the time of writing, the California Budget website remains offline Read More
-
K-12 Sector Under Attack by Vice Society RaaS Group
PRIVACY PRIVACY The CTI team at the MS-ISAC has observed the Vice Society RaaS group increasingly targeting U.S. schools, specifically K-12 organizations.[…] Read More