-
Data Breach Disrupts UK Army Recruitment
PRIVACY PRIVACY British Army online recruitment system down since March following data breach Read More
-
Emotet Tests New TTPs
PRIVACY PRIVACY Botnet’s operators spotted spring cleaning its delivery tactics, techniques and procedures Read More
-
Siloed Tech Prompts Security Worries
PRIVACY PRIVACY IT leaders fear fragmented tech management could increase cyber risk Read More
-
PureVPN introduces quantum-resistant feature to enhance security, tackle threats
PRIVACY PRIVACY Virtual private network (VPN) provider PureVPN has introduced a quantum-resistant feature to its OpenVPN protocol to provide users with more security and privacy for the post-quantum world. The firm has partnered with Quantinuum to deploy quantum-resistant encryption keys which, using its Quantum Origin platform, are generated via a verified quantum process, PureVPN said.…
-
Emotet tests new attack techniques: Sign of things to come?
PRIVACY PRIVACY Notorious threat group Emotet has been detected testing new and significantly different attack techniques potentially in preparation for larger campaigns or selective and limited attacks, according to research from cybersecurity vendor Proofpoint. The firm stated the activity occurred while the prolific botnet and Trojan threat actor was on a period of hiatus and…
-
DevOps release process
PRIVACY PRIVACY In the previous article, we covered the build and test process and why it’s important to use automated scanning tools for security scanning and remediation. The build pipeline compiles the software and packages into an artifact. The artifact is then stored in a repository (called a registry) where it can be retrieved by…
-
Security Teams Should Be Addressing Quantum Cyber-Threats Now
PRIVACY PRIVACY Organizations should move toward post-quantum cryptography now to counter upcoming quantum cyber-threats Read More
-
Two More Indicted Over North Korea Sanctions Evasion Plot
PRIVACY PRIVACY Brit and Spaniard face 20 years behind bars if found guilty Read More
-
New SDP 2.0 specification facilitates zero-trust maturity
PRIVACY PRIVACY The Cloud Security Alliance (CSA) recently published the Software-Defined Perimeter (SDP) 2.0 specification, which is created by their SDP and zero-trust working groups. Given that the original specification was published in 2014 and we’ve seen industry-wide eagerness to adopt zero trust, this update is timely. SDP ties closely to the pursuit of implementing…
-
The cloud security emperor has no pants
PRIVACY PRIVACY As anyone who has worked on a cross-functional team with no clear owner knows, “shared” or “joint” responsibility often means that everyone assumes that someone else is taking care of the problem. Without clear effort to make sure that nothing falls between the two (or more) teams, something always gets missed. The shared…